Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 05:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
648cdc85043356525f08aaecc47a80df.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
648cdc85043356525f08aaecc47a80df.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
648cdc85043356525f08aaecc47a80df.exe
-
Size
2.2MB
-
MD5
648cdc85043356525f08aaecc47a80df
-
SHA1
20f7445130deed36a232ed4d2d6dab3aa7ec2d9f
-
SHA256
d617064c7d9dfa0b1a2eaaee60235258b6c23c1e94c48222c17cb63f5ac4d912
-
SHA512
1b88eb4cbbee7564f4b0e49cc14859b443e003838ef697e24a75b94480625cd5c39fcd442bea7af9253b12483b41140baecc238c2d57275a7e3bb94016e273f2
-
SSDEEP
49152:Eb5k2L5+qKf9/OrJ/IayrRORJvCcCuK5BhBYFb++djdd/+PIEI:Ekqy9GrJ/lyrb+c+pdd/iIEI
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2184 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3020 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1972 648cdc85043356525f08aaecc47a80df.exe 1972 648cdc85043356525f08aaecc47a80df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 648cdc85043356525f08aaecc47a80df.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2184 1972 648cdc85043356525f08aaecc47a80df.exe 28 PID 1972 wrote to memory of 2184 1972 648cdc85043356525f08aaecc47a80df.exe 28 PID 1972 wrote to memory of 2184 1972 648cdc85043356525f08aaecc47a80df.exe 28 PID 2184 wrote to memory of 3020 2184 cmd.exe 30 PID 2184 wrote to memory of 3020 2184 cmd.exe 30 PID 2184 wrote to memory of 3020 2184 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\648cdc85043356525f08aaecc47a80df.exe"C:\Users\Admin\AppData\Local\Temp\648cdc85043356525f08aaecc47a80df.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\648cdc85043356525f08aaecc47a80df.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3020
-
-