Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 16:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6fd2a5b92f0ad0b325b066baf2450278.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
6fd2a5b92f0ad0b325b066baf2450278.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
6fd2a5b92f0ad0b325b066baf2450278.exe
-
Size
644KB
-
MD5
6fd2a5b92f0ad0b325b066baf2450278
-
SHA1
b9cf81f1e6d86bd2077e11b13c9b5ff4e35cdc78
-
SHA256
faacb4a22b05c165ca702ebfad59c5060d02e609c00298e9ff4e57f04724437b
-
SHA512
321f1d80c9f2940cf550a375159bfd5374a982fd86175e19bd7407c66e5435344d4f9e7cb13096660707bb6bb72b9248cbe000135929cf5a9dada7b5475fd97e
-
SSDEEP
12288:FytbV3kSoXaLnToslQxnK9+d4MA00OyomYJTzI:Eb5kSYaLTVlmK9+C+O
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2372 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2980 6fd2a5b92f0ad0b325b066baf2450278.exe 2980 6fd2a5b92f0ad0b325b066baf2450278.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2980 6fd2a5b92f0ad0b325b066baf2450278.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2232 2980 6fd2a5b92f0ad0b325b066baf2450278.exe 28 PID 2980 wrote to memory of 2232 2980 6fd2a5b92f0ad0b325b066baf2450278.exe 28 PID 2980 wrote to memory of 2232 2980 6fd2a5b92f0ad0b325b066baf2450278.exe 28 PID 2232 wrote to memory of 2372 2232 cmd.exe 30 PID 2232 wrote to memory of 2372 2232 cmd.exe 30 PID 2232 wrote to memory of 2372 2232 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd2a5b92f0ad0b325b066baf2450278.exe"C:\Users\Admin\AppData\Local\Temp\6fd2a5b92f0ad0b325b066baf2450278.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6fd2a5b92f0ad0b325b066baf2450278.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2372
-
-