Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39477c3461faca324211fb58026db8c3.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
39477c3461faca324211fb58026db8c3.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
39477c3461faca324211fb58026db8c3.exe
-
Size
488KB
-
MD5
39477c3461faca324211fb58026db8c3
-
SHA1
f9b03e4958c3aa4eec9b5fff5ed102cde6fdc957
-
SHA256
fb48e0bffc69f2cf52bd4851776bbbaf497c69e79ecbb6884aa4b7446c776f85
-
SHA512
6214d47ae8c5b379bee04e062bcafe4b688fe5e585087bb5b28b3a89f5e3980f685dcfe413401a6b3d8c10ae849e063acb0816681803a604571c28702f87cf81
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEtJ5Vo38chamvY+NFaRKivOHRLUjaR:FytbV3kSoXaLnTosl+C38chaQNSOHRLX
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2396 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 39477c3461faca324211fb58026db8c3.exe 1696 39477c3461faca324211fb58026db8c3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1696 39477c3461faca324211fb58026db8c3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2392 1696 39477c3461faca324211fb58026db8c3.exe 28 PID 1696 wrote to memory of 2392 1696 39477c3461faca324211fb58026db8c3.exe 28 PID 1696 wrote to memory of 2392 1696 39477c3461faca324211fb58026db8c3.exe 28 PID 2392 wrote to memory of 2396 2392 cmd.exe 30 PID 2392 wrote to memory of 2396 2392 cmd.exe 30 PID 2392 wrote to memory of 2396 2392 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\39477c3461faca324211fb58026db8c3.exe"C:\Users\Admin\AppData\Local\Temp\39477c3461faca324211fb58026db8c3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\39477c3461faca324211fb58026db8c3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2396
-
-