Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1884ad3f22aed9798895ea97db874a01.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1884ad3f22aed9798895ea97db874a01.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1884ad3f22aed9798895ea97db874a01.exe
-
Size
488KB
-
MD5
1884ad3f22aed9798895ea97db874a01
-
SHA1
b88a28ddbce555922053f49568f060e2876894b8
-
SHA256
96f964d3d875219c62db09de389a74ca0e62a5b30e27c215903ef970b3084c11
-
SHA512
cee4622157381ebb81a774786e0291727401fc5c7cf6c66dc608f8f827f356f54edd4de34b9f3afe8453e220d297d310594e4a82a2bc3c3a6aad09f06d5e33c6
-
SSDEEP
12288:FytbV3kSoXaLnToslW9xypoeuP3mVSX6X60XWj4LaV0wcY:Eb5kSYaLTVlW9V1Pl6TG8GVvcY
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2076 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2836 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 1884ad3f22aed9798895ea97db874a01.exe 2204 1884ad3f22aed9798895ea97db874a01.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2204 1884ad3f22aed9798895ea97db874a01.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2076 2204 1884ad3f22aed9798895ea97db874a01.exe 28 PID 2204 wrote to memory of 2076 2204 1884ad3f22aed9798895ea97db874a01.exe 28 PID 2204 wrote to memory of 2076 2204 1884ad3f22aed9798895ea97db874a01.exe 28 PID 2076 wrote to memory of 2836 2076 cmd.exe 30 PID 2076 wrote to memory of 2836 2076 cmd.exe 30 PID 2076 wrote to memory of 2836 2076 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1884ad3f22aed9798895ea97db874a01.exe"C:\Users\Admin\AppData\Local\Temp\1884ad3f22aed9798895ea97db874a01.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1884ad3f22aed9798895ea97db874a01.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2836
-
-