Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 15:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a639094478626f1785743941dde7629.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a639094478626f1785743941dde7629.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
3a639094478626f1785743941dde7629.exe
-
Size
1.2MB
-
MD5
3a639094478626f1785743941dde7629
-
SHA1
c0e8d856032215fcb132536ef7bafe8bc48dddce
-
SHA256
bec9ef4cf83425e368ea4fa2e2988b401497ec14a1fda8fa2c07e7c84d7b7ce4
-
SHA512
adf0882d2abd2de9d5e5d346698d68c72dd0065be666b438ce9d95f576318c1f321b6bfe84fa8cf263ef5ea874b9e874d489f6f33acca4a60ac5dfb7225ea1fe
-
SSDEEP
24576:Eb5kSYaLTVl0mzZ//YwAHdPaLVY8DUHMTgocl9w95PTPgS9s9EFm77RrbI:Eb5k2L5sPiVY8yMTgo9dzl96E0prM
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2688 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 3a639094478626f1785743941dde7629.exe 2288 3a639094478626f1785743941dde7629.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 3a639094478626f1785743941dde7629.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2388 2288 3a639094478626f1785743941dde7629.exe 29 PID 2288 wrote to memory of 2388 2288 3a639094478626f1785743941dde7629.exe 29 PID 2288 wrote to memory of 2388 2288 3a639094478626f1785743941dde7629.exe 29 PID 2388 wrote to memory of 2688 2388 cmd.exe 30 PID 2388 wrote to memory of 2688 2388 cmd.exe 30 PID 2388 wrote to memory of 2688 2388 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a639094478626f1785743941dde7629.exe"C:\Users\Admin\AppData\Local\Temp\3a639094478626f1785743941dde7629.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3a639094478626f1785743941dde7629.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2688
-
-