Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 12:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
566bbcf244bd1050e110e8706a278393.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
566bbcf244bd1050e110e8706a278393.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
566bbcf244bd1050e110e8706a278393.exe
-
Size
316KB
-
MD5
566bbcf244bd1050e110e8706a278393
-
SHA1
ecc6b5e4ba048e09ead8a5f1b355751af4873719
-
SHA256
cac96ea7009d23cd3d9c354a27430b0dd39a963d9932c0608982fdcabb27c0a7
-
SHA512
38d44b2d71d2095f7c6f3b668773ce0bd216e62c96faf19acfa2902d2b03516eb7f164e3a18fb1df48e75f3b93aae098e4c4e098ee6b2641abad5d7f7875a100
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEB7qbdPlbw+E:FytbV3kSoXaLnTosl0qhPRzE
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2064 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1448 566bbcf244bd1050e110e8706a278393.exe 1448 566bbcf244bd1050e110e8706a278393.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1448 566bbcf244bd1050e110e8706a278393.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2208 1448 566bbcf244bd1050e110e8706a278393.exe 28 PID 1448 wrote to memory of 2208 1448 566bbcf244bd1050e110e8706a278393.exe 28 PID 1448 wrote to memory of 2208 1448 566bbcf244bd1050e110e8706a278393.exe 28 PID 2208 wrote to memory of 2064 2208 cmd.exe 30 PID 2208 wrote to memory of 2064 2208 cmd.exe 30 PID 2208 wrote to memory of 2064 2208 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\566bbcf244bd1050e110e8706a278393.exe"C:\Users\Admin\AppData\Local\Temp\566bbcf244bd1050e110e8706a278393.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\566bbcf244bd1050e110e8706a278393.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2064
-
-