Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7519cebf5f5e6e8f202b5c56dda98906.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
7519cebf5f5e6e8f202b5c56dda98906.exe
-
Size
2.2MB
-
MD5
7519cebf5f5e6e8f202b5c56dda98906
-
SHA1
8e05e6a77ffbfa20380e769e963586074ce0c92a
-
SHA256
bbccebe9f313b6789885806842eaa79078604205654b0ed0f282d6dfc0db65f7
-
SHA512
64f3b8d6366b4373e4d60501355aaeb02b7e20ac3689cac88250e6f0053edff766d267284e18ee55f4b70d97c0a902750993754ea8fe35807a69352ea0d289b6
-
SSDEEP
49152:Eb5k2L5fYGPAzFQHJyN4UwGOtHRvRFvQtnfzenP2EsGt:E24ApQpyKtGOtRvRten0vzt
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7519cebf5f5e6e8f202b5c56dda98906.exepid Process 1488 7519cebf5f5e6e8f202b5c56dda98906.exe 1488 7519cebf5f5e6e8f202b5c56dda98906.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7519cebf5f5e6e8f202b5c56dda98906.exedescription pid Process Token: SeDebugPrivilege 1488 7519cebf5f5e6e8f202b5c56dda98906.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7519cebf5f5e6e8f202b5c56dda98906.execmd.exedescription pid Process procid_target PID 1488 wrote to memory of 3960 1488 7519cebf5f5e6e8f202b5c56dda98906.exe 87 PID 1488 wrote to memory of 3960 1488 7519cebf5f5e6e8f202b5c56dda98906.exe 87 PID 3960 wrote to memory of 2244 3960 cmd.exe 89 PID 3960 wrote to memory of 2244 3960 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7519cebf5f5e6e8f202b5c56dda98906.exe"C:\Users\Admin\AppData\Local\Temp\7519cebf5f5e6e8f202b5c56dda98906.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7519cebf5f5e6e8f202b5c56dda98906.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2244
-
-