Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 09:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e00e9632e3feaaa7cf5bcaca4639fb5.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e00e9632e3feaaa7cf5bcaca4639fb5.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
4e00e9632e3feaaa7cf5bcaca4639fb5.exe
-
Size
488KB
-
MD5
4e00e9632e3feaaa7cf5bcaca4639fb5
-
SHA1
57e18ed5db1bde0352053af1515fe6ad33c63176
-
SHA256
417e291e7f651910a5a0f09e7106ba14c5788f89fb6fc66e081384b82e32d515
-
SHA512
12e1e5b8cdb2b75efb740393c6a14481f96c84dac61139e77673063448868052527989fc50f4b45e357ea6ea59996e13f950a08308c19ead30c18746e458a476
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEENOmoR6uRTVyWlg1EnEDFZ4lkd4o6mxMP:FytbV3kSoXaLnTosl3oT/yEXq4Vtcw6u
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 4e00e9632e3feaaa7cf5bcaca4639fb5.exe 2184 4e00e9632e3feaaa7cf5bcaca4639fb5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 4e00e9632e3feaaa7cf5bcaca4639fb5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2752 2184 4e00e9632e3feaaa7cf5bcaca4639fb5.exe 28 PID 2184 wrote to memory of 2752 2184 4e00e9632e3feaaa7cf5bcaca4639fb5.exe 28 PID 2184 wrote to memory of 2752 2184 4e00e9632e3feaaa7cf5bcaca4639fb5.exe 28 PID 2752 wrote to memory of 2656 2752 cmd.exe 30 PID 2752 wrote to memory of 2656 2752 cmd.exe 30 PID 2752 wrote to memory of 2656 2752 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e00e9632e3feaaa7cf5bcaca4639fb5.exe"C:\Users\Admin\AppData\Local\Temp\4e00e9632e3feaaa7cf5bcaca4639fb5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4e00e9632e3feaaa7cf5bcaca4639fb5.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2656
-
-