Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 12:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5684debb315de5541afb2db31edb6053.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5684debb315de5541afb2db31edb6053.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
5684debb315de5541afb2db31edb6053.exe
-
Size
488KB
-
MD5
5684debb315de5541afb2db31edb6053
-
SHA1
0a7e3a28f6b105c95a0c332d4468526a41c62403
-
SHA256
5a49b2ea7c66af7c2d167bea1eeb3b3df50cf428beeb4bdbc6b54c0ded642ff6
-
SHA512
635df396e41c0df3854a894f6af9fec0af04916728ee126784fe24199ea565415c243d4f57b8d8574dc636fa8bbfd186cd70cc374ae901bc53109bd1fdd14000
-
SSDEEP
12288:FytbV3kSoXaLnToslBdaPrkzodQ+OicAUXDQRL:Eb5kSYaLTVlBdkrkzoC+4A1L
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2976 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2972 5684debb315de5541afb2db31edb6053.exe 2972 5684debb315de5541afb2db31edb6053.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2972 5684debb315de5541afb2db31edb6053.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2740 2972 5684debb315de5541afb2db31edb6053.exe 28 PID 2972 wrote to memory of 2740 2972 5684debb315de5541afb2db31edb6053.exe 28 PID 2972 wrote to memory of 2740 2972 5684debb315de5541afb2db31edb6053.exe 28 PID 2740 wrote to memory of 2976 2740 cmd.exe 30 PID 2740 wrote to memory of 2976 2740 cmd.exe 30 PID 2740 wrote to memory of 2976 2740 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5684debb315de5541afb2db31edb6053.exe"C:\Users\Admin\AppData\Local\Temp\5684debb315de5541afb2db31edb6053.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5684debb315de5541afb2db31edb6053.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2976
-
-