Analysis
-
max time kernel
120s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3736a730bc90d9b9a7b77aa7c3c0050b.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3736a730bc90d9b9a7b77aa7c3c0050b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3736a730bc90d9b9a7b77aa7c3c0050b.exe
-
Size
2.2MB
-
MD5
3736a730bc90d9b9a7b77aa7c3c0050b
-
SHA1
d24b83075d0943e5da5bcd848f5b271416c65f5a
-
SHA256
aa08246ba17e735d0cf75c1f5387bd089362810f2e8281079bfa1bd10de17c6f
-
SHA512
3efa6e01ce259777e320a8a6e8b51ab7f998d59c81e7ed5fa07398e9759b861b801e7587be7accd7426bb2dac1a369814bde9896555e3fd22959e2058fca65d9
-
SSDEEP
49152:Eb5k2L5Hzi+HmMzoV8KAypp3knuXTlLOa9vg0bd21ik:EdNcAU9jNOa9vgQA1F
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 3736a730bc90d9b9a7b77aa7c3c0050b.exe 1160 3736a730bc90d9b9a7b77aa7c3c0050b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 3736a730bc90d9b9a7b77aa7c3c0050b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2340 1160 3736a730bc90d9b9a7b77aa7c3c0050b.exe 28 PID 1160 wrote to memory of 2340 1160 3736a730bc90d9b9a7b77aa7c3c0050b.exe 28 PID 1160 wrote to memory of 2340 1160 3736a730bc90d9b9a7b77aa7c3c0050b.exe 28 PID 2340 wrote to memory of 2716 2340 cmd.exe 30 PID 2340 wrote to memory of 2716 2340 cmd.exe 30 PID 2340 wrote to memory of 2716 2340 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3736a730bc90d9b9a7b77aa7c3c0050b.exe"C:\Users\Admin\AppData\Local\Temp\3736a730bc90d9b9a7b77aa7c3c0050b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3736a730bc90d9b9a7b77aa7c3c0050b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2716
-
-