Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 06:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4aad35b2233b97481f2d8b2f230cc4dd.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4aad35b2233b97481f2d8b2f230cc4dd.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
4aad35b2233b97481f2d8b2f230cc4dd.exe
-
Size
316KB
-
MD5
4aad35b2233b97481f2d8b2f230cc4dd
-
SHA1
8865d6c46d38a04d2f413934c6e9c4ec779a0de5
-
SHA256
e97bf0aac6a67d9cab061d4807bc410e3d2a25e45e93908ca09a2ba54b87ee2d
-
SHA512
b7947e3c747dca247121b26eb451eaa433a2a6fbb660f3b816d33bda34fce0217685a37293b021b12844db0f9ebebd31e47a21e46644abbe7a5cc78cecd6f30f
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEFh52SyX:FytbV3kSoXaLnToslHSyX
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2864 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2928 4aad35b2233b97481f2d8b2f230cc4dd.exe 2928 4aad35b2233b97481f2d8b2f230cc4dd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2928 4aad35b2233b97481f2d8b2f230cc4dd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3048 2928 4aad35b2233b97481f2d8b2f230cc4dd.exe 28 PID 2928 wrote to memory of 3048 2928 4aad35b2233b97481f2d8b2f230cc4dd.exe 28 PID 2928 wrote to memory of 3048 2928 4aad35b2233b97481f2d8b2f230cc4dd.exe 28 PID 3048 wrote to memory of 2864 3048 cmd.exe 30 PID 3048 wrote to memory of 2864 3048 cmd.exe 30 PID 3048 wrote to memory of 2864 3048 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aad35b2233b97481f2d8b2f230cc4dd.exe"C:\Users\Admin\AppData\Local\Temp\4aad35b2233b97481f2d8b2f230cc4dd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4aad35b2233b97481f2d8b2f230cc4dd.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2864
-
-