Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 15:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a498357eb454a21ef1c52b9a3368583.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a498357eb454a21ef1c52b9a3368583.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
3a498357eb454a21ef1c52b9a3368583.exe
-
Size
528KB
-
MD5
3a498357eb454a21ef1c52b9a3368583
-
SHA1
e330d06b361b02d6e5eaf3e445d8721ffdcbaecc
-
SHA256
362c833278ec67ecaaf0b4ae8709088350281940d91a4e879947200a6ccf66fa
-
SHA512
e73f0631b21664852c2befbe2d8b554fc8283c47013c8d43d46ebc833f62ffe7edb38e5c525fc98a5a506003ecff769ea3c25ffce44c0b3db4a58c25c27d4028
-
SSDEEP
12288:FytbV3kSoXaLnToslXWhVpQUWTx83nGZMQ9iUkS6a:Eb5kSYaLTVlmhzm8XGq0BkSD
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 3a498357eb454a21ef1c52b9a3368583.exe 2348 3a498357eb454a21ef1c52b9a3368583.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 3a498357eb454a21ef1c52b9a3368583.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2180 2348 3a498357eb454a21ef1c52b9a3368583.exe 30 PID 2348 wrote to memory of 2180 2348 3a498357eb454a21ef1c52b9a3368583.exe 30 PID 2348 wrote to memory of 2180 2348 3a498357eb454a21ef1c52b9a3368583.exe 30 PID 2180 wrote to memory of 1656 2180 cmd.exe 28 PID 2180 wrote to memory of 1656 2180 cmd.exe 28 PID 2180 wrote to memory of 1656 2180 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a498357eb454a21ef1c52b9a3368583.exe"C:\Users\Admin\AppData\Local\Temp\3a498357eb454a21ef1c52b9a3368583.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3a498357eb454a21ef1c52b9a3368583.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2180
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:1656