Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6542e1ef23befdd843205925ae78a93b.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
6542e1ef23befdd843205925ae78a93b.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
6542e1ef23befdd843205925ae78a93b.exe
-
Size
5.1MB
-
MD5
6542e1ef23befdd843205925ae78a93b
-
SHA1
46362ceac5a9981c7e3e5ba84901c1a07577f133
-
SHA256
f8b5498d8f8bbee754a06adbfac6a356fa15ea671c7858a9e2469cc651176ab5
-
SHA512
9ff44a7e6b0ef2ca52bbc47a73b1069e6e9e0d3bb945406f6090405695bcdf8d8491129c55685364b83467579b0709c67e819e376a18d80f732426727d474d3f
-
SSDEEP
98304:EVKqacT20Ynzc2YzzbTJpgLASplJkZ2L+oByE9xLjniEgIbeJ73:EwN0Ynzcf/bTwEYJ9LhlzNgIqJD
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2980 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2924 6542e1ef23befdd843205925ae78a93b.exe 2924 6542e1ef23befdd843205925ae78a93b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2924 6542e1ef23befdd843205925ae78a93b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2792 2924 6542e1ef23befdd843205925ae78a93b.exe 28 PID 2924 wrote to memory of 2792 2924 6542e1ef23befdd843205925ae78a93b.exe 28 PID 2924 wrote to memory of 2792 2924 6542e1ef23befdd843205925ae78a93b.exe 28 PID 2792 wrote to memory of 2980 2792 cmd.exe 30 PID 2792 wrote to memory of 2980 2792 cmd.exe 30 PID 2792 wrote to memory of 2980 2792 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6542e1ef23befdd843205925ae78a93b.exe"C:\Users\Admin\AppData\Local\Temp\6542e1ef23befdd843205925ae78a93b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6542e1ef23befdd843205925ae78a93b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2980
-
-