Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7519cebf5f5e6e8f202b5c56dda98906.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
7519cebf5f5e6e8f202b5c56dda98906.exe
-
Size
2.2MB
-
MD5
7519cebf5f5e6e8f202b5c56dda98906
-
SHA1
8e05e6a77ffbfa20380e769e963586074ce0c92a
-
SHA256
bbccebe9f313b6789885806842eaa79078604205654b0ed0f282d6dfc0db65f7
-
SHA512
64f3b8d6366b4373e4d60501355aaeb02b7e20ac3689cac88250e6f0053edff766d267284e18ee55f4b70d97c0a902750993754ea8fe35807a69352ea0d289b6
-
SSDEEP
49152:Eb5k2L5fYGPAzFQHJyN4UwGOtHRvRFvQtnfzenP2EsGt:E24ApQpyKtGOtRvRten0vzt
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 548 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7519cebf5f5e6e8f202b5c56dda98906.exepid Process 2168 7519cebf5f5e6e8f202b5c56dda98906.exe 2168 7519cebf5f5e6e8f202b5c56dda98906.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7519cebf5f5e6e8f202b5c56dda98906.exedescription pid Process Token: SeDebugPrivilege 2168 7519cebf5f5e6e8f202b5c56dda98906.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7519cebf5f5e6e8f202b5c56dda98906.execmd.exedescription pid Process procid_target PID 2168 wrote to memory of 548 2168 7519cebf5f5e6e8f202b5c56dda98906.exe 28 PID 2168 wrote to memory of 548 2168 7519cebf5f5e6e8f202b5c56dda98906.exe 28 PID 2168 wrote to memory of 548 2168 7519cebf5f5e6e8f202b5c56dda98906.exe 28 PID 548 wrote to memory of 1704 548 cmd.exe 26 PID 548 wrote to memory of 1704 548 cmd.exe 26 PID 548 wrote to memory of 1704 548 cmd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\7519cebf5f5e6e8f202b5c56dda98906.exe"C:\Users\Admin\AppData\Local\Temp\7519cebf5f5e6e8f202b5c56dda98906.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7519cebf5f5e6e8f202b5c56dda98906.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:548
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:1704