Analysis
-
max time kernel
13s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe
-
Size
316KB
-
MD5
3d2ab2dc7ff6c1bcd350ba0bbdf345ac
-
SHA1
7bb9d2a8e5052017d19f125d66659eea0a999c9a
-
SHA256
1e7cccc58540797273da08d3982de1cb0da7b18f7a386070b24fb2019f790f65
-
SHA512
f2b34b8de23c9d0724a76d185dccda35e320eb4fffe54e22b27ef9c6fbb3d6389be022214adb0aaad0417a0e7d8737141d474b82df00671cf4aa6aeb6535364a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEhR+2SLyk:FytbV3kSoXaLnTosl2R+2Bk
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1420 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1144 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 768 3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe 768 3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 768 3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 768 wrote to memory of 1420 768 3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe 28 PID 768 wrote to memory of 1420 768 3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe 28 PID 768 wrote to memory of 1420 768 3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe 28 PID 1420 wrote to memory of 1144 1420 cmd.exe 30 PID 1420 wrote to memory of 1144 1420 cmd.exe 30 PID 1420 wrote to memory of 1144 1420 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe"C:\Users\Admin\AppData\Local\Temp\3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3d2ab2dc7ff6c1bcd350ba0bbdf345ac.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1144
-
-