Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 10:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
71fcc37db3f8978285797dbd381b3742.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
71fcc37db3f8978285797dbd381b3742.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
71fcc37db3f8978285797dbd381b3742.exe
-
Size
488KB
-
MD5
71fcc37db3f8978285797dbd381b3742
-
SHA1
2763a1f5cf993489d76508fedcc5210bc09a063b
-
SHA256
10fffa0297e7a8be33067538132d108728e9e3c5dd8afbfa8f52b6033b3fb6e7
-
SHA512
f270deaee3a0c222911643bbe03127510aaebd9a9b14d2b4e863739892f8970ada4c6eef8a1811870d88b55af5cd925adff2160efb83baf1b4bee7ab8e0b74c6
-
SSDEEP
12288:FytbV3kSoXaLnToslzpgkq6xz1zDi5DZ0S+W+A:Eb5kSYaLTVljqmz1zDi5urfA
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2512 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2044 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 660 71fcc37db3f8978285797dbd381b3742.exe 660 71fcc37db3f8978285797dbd381b3742.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 660 71fcc37db3f8978285797dbd381b3742.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 660 wrote to memory of 2512 660 71fcc37db3f8978285797dbd381b3742.exe 28 PID 660 wrote to memory of 2512 660 71fcc37db3f8978285797dbd381b3742.exe 28 PID 660 wrote to memory of 2512 660 71fcc37db3f8978285797dbd381b3742.exe 28 PID 2512 wrote to memory of 2044 2512 cmd.exe 30 PID 2512 wrote to memory of 2044 2512 cmd.exe 30 PID 2512 wrote to memory of 2044 2512 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\71fcc37db3f8978285797dbd381b3742.exe"C:\Users\Admin\AppData\Local\Temp\71fcc37db3f8978285797dbd381b3742.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\71fcc37db3f8978285797dbd381b3742.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2044
-
-