Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36764dfa2e35c8a044970ba6a484d13d.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
36764dfa2e35c8a044970ba6a484d13d.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
36764dfa2e35c8a044970ba6a484d13d.exe
-
Size
316KB
-
MD5
36764dfa2e35c8a044970ba6a484d13d
-
SHA1
09ee03f65222d4656435f52d21edc397b5869040
-
SHA256
63813440037ec8b565f485fc92a581b148b1c73e24582080f3bf7b1cf1d79a4a
-
SHA512
0bea5a61a302dd6c00b124f88294e0f939ea67a539a2fb610adcb206c15c8befaf300ee86bf40562e38e32d29b857e91e3fb81f65452d7280c5cef045f752b51
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiElxP3TgOzd:FytbV3kSoXaLnTosl6Rga
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1216 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2212 36764dfa2e35c8a044970ba6a484d13d.exe 2212 36764dfa2e35c8a044970ba6a484d13d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 36764dfa2e35c8a044970ba6a484d13d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2312 2212 36764dfa2e35c8a044970ba6a484d13d.exe 29 PID 2212 wrote to memory of 2312 2212 36764dfa2e35c8a044970ba6a484d13d.exe 29 PID 2212 wrote to memory of 2312 2212 36764dfa2e35c8a044970ba6a484d13d.exe 29 PID 2312 wrote to memory of 1216 2312 cmd.exe 30 PID 2312 wrote to memory of 1216 2312 cmd.exe 30 PID 2312 wrote to memory of 1216 2312 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\36764dfa2e35c8a044970ba6a484d13d.exe"C:\Users\Admin\AppData\Local\Temp\36764dfa2e35c8a044970ba6a484d13d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\36764dfa2e35c8a044970ba6a484d13d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1216
-
-