Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 10:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
408fc50871e83768a73043cac3ce2fba.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
408fc50871e83768a73043cac3ce2fba.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
408fc50871e83768a73043cac3ce2fba.exe
-
Size
488KB
-
MD5
408fc50871e83768a73043cac3ce2fba
-
SHA1
1d3ed9950c4eb5cac3b9ea777c9fb305f7e1df67
-
SHA256
ca242a5688923c302e020a46a7b16e604ec2c8f1077bff938dc1fe57e1902f17
-
SHA512
f9fc8abfe5fbe27459a335e82784aa90165637c2734bae78bfefac352a06ef890845a86dbb069e2783bed25991bc7acd19000eb6c6e6b84dda2e6f3632b3024e
-
SSDEEP
12288:FytbV3kSoXaLnToslMALit9fKBPAjZTyQk:Eb5kSYaLTVlRGMIjRPk
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 408fc50871e83768a73043cac3ce2fba.exe 2384 408fc50871e83768a73043cac3ce2fba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 408fc50871e83768a73043cac3ce2fba.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2316 2384 408fc50871e83768a73043cac3ce2fba.exe 28 PID 2384 wrote to memory of 2316 2384 408fc50871e83768a73043cac3ce2fba.exe 28 PID 2384 wrote to memory of 2316 2384 408fc50871e83768a73043cac3ce2fba.exe 28 PID 2316 wrote to memory of 2664 2316 cmd.exe 30 PID 2316 wrote to memory of 2664 2316 cmd.exe 30 PID 2316 wrote to memory of 2664 2316 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\408fc50871e83768a73043cac3ce2fba.exe"C:\Users\Admin\AppData\Local\Temp\408fc50871e83768a73043cac3ce2fba.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\408fc50871e83768a73043cac3ce2fba.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2664
-
-