Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 19:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
65d45deb7d910b91ea88cc97d18fb119.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
65d45deb7d910b91ea88cc97d18fb119.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
65d45deb7d910b91ea88cc97d18fb119.exe
-
Size
488KB
-
MD5
65d45deb7d910b91ea88cc97d18fb119
-
SHA1
6f33cf1c987ac10c3b1e684faf4c690070c7f003
-
SHA256
c5ed0aeae0e248ede8c5b181e7bd8f46cb778be87771029bf75f599ca7e6bd99
-
SHA512
94acc2bf2598fd04abb2673ccb6d925c1cafea554fbb425c4eb125ca40d402279a3d7de7b901fc26d16c1c1d3d21d8639c3584f30511ea9e76e784fc814b76fa
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEDPzTFfloKTKiUBAnBBg4hNW+fymf:FytbV3kSoXaLnTosl6f72664H
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1520 65d45deb7d910b91ea88cc97d18fb119.exe 1520 65d45deb7d910b91ea88cc97d18fb119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1520 65d45deb7d910b91ea88cc97d18fb119.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2976 1520 65d45deb7d910b91ea88cc97d18fb119.exe 28 PID 1520 wrote to memory of 2976 1520 65d45deb7d910b91ea88cc97d18fb119.exe 28 PID 1520 wrote to memory of 2976 1520 65d45deb7d910b91ea88cc97d18fb119.exe 28 PID 2976 wrote to memory of 2140 2976 cmd.exe 30 PID 2976 wrote to memory of 2140 2976 cmd.exe 30 PID 2976 wrote to memory of 2140 2976 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d45deb7d910b91ea88cc97d18fb119.exe"C:\Users\Admin\AppData\Local\Temp\65d45deb7d910b91ea88cc97d18fb119.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\65d45deb7d910b91ea88cc97d18fb119.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2140
-
-