Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 20:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
41cbde885dc2ba7dd7e66ee801063d37.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
41cbde885dc2ba7dd7e66ee801063d37.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
41cbde885dc2ba7dd7e66ee801063d37.exe
-
Size
644KB
-
MD5
41cbde885dc2ba7dd7e66ee801063d37
-
SHA1
de9755c2b8adc13fdb71e7d4f9cf2e819c31ba23
-
SHA256
1d6f787e64adc8b3d2b755ccb85f0175c23621fa4ac397bbeb2324dbeeab0efd
-
SHA512
af9cdab99801af95e48ce5b0d1927c2710cc0c03d1c78b9cb5b81be854d3a79630d65205adeeb87ba1b03a736b98da80f50881f5d2808d040e7656aad24b253d
-
SSDEEP
12288:FytbV3kSoXaLnToslwucukX9zavtjQUF5YlFYTHw1gS:Eb5kSYaLTVlwuJ4zavDF5YlShS
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1872 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2640 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 41cbde885dc2ba7dd7e66ee801063d37.exe 2644 41cbde885dc2ba7dd7e66ee801063d37.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 41cbde885dc2ba7dd7e66ee801063d37.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1872 2644 41cbde885dc2ba7dd7e66ee801063d37.exe 28 PID 2644 wrote to memory of 1872 2644 41cbde885dc2ba7dd7e66ee801063d37.exe 28 PID 2644 wrote to memory of 1872 2644 41cbde885dc2ba7dd7e66ee801063d37.exe 28 PID 1872 wrote to memory of 2640 1872 cmd.exe 30 PID 1872 wrote to memory of 2640 1872 cmd.exe 30 PID 1872 wrote to memory of 2640 1872 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\41cbde885dc2ba7dd7e66ee801063d37.exe"C:\Users\Admin\AppData\Local\Temp\41cbde885dc2ba7dd7e66ee801063d37.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\41cbde885dc2ba7dd7e66ee801063d37.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2640
-
-