Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2b569b1106ac04b79183f3c25941255f.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b569b1106ac04b79183f3c25941255f.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
2b569b1106ac04b79183f3c25941255f.exe
-
Size
488KB
-
MD5
2b569b1106ac04b79183f3c25941255f
-
SHA1
129b2e3cc24e398703623a9ba9b74b7af00f1061
-
SHA256
65ca4b81d75d296d0f5c4011fadda8970e0866da82333ab6fcb62cbb254e15b5
-
SHA512
cb3f7c232fabc67c56ba4c2538c309c1e62c24550dd17dd02b189463aa2f01b2a3826fd5e9b5a9489b38ef0e856d5f22f9ef4fbd51d80482c23741bc9c47c680
-
SSDEEP
12288:FytbV3kSoXaLnToslUZZdKjVrPgND+jZUie+Up8:Eb5kSYaLTVlUDdKprINCFm+R
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2796 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 2b569b1106ac04b79183f3c25941255f.exe 2032 2b569b1106ac04b79183f3c25941255f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 2b569b1106ac04b79183f3c25941255f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2748 2032 2b569b1106ac04b79183f3c25941255f.exe 28 PID 2032 wrote to memory of 2748 2032 2b569b1106ac04b79183f3c25941255f.exe 28 PID 2032 wrote to memory of 2748 2032 2b569b1106ac04b79183f3c25941255f.exe 28 PID 2748 wrote to memory of 2796 2748 cmd.exe 30 PID 2748 wrote to memory of 2796 2748 cmd.exe 30 PID 2748 wrote to memory of 2796 2748 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b569b1106ac04b79183f3c25941255f.exe"C:\Users\Admin\AppData\Local\Temp\2b569b1106ac04b79183f3c25941255f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2b569b1106ac04b79183f3c25941255f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2796
-
-