Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 12:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7757edde8657313599e535a80d6fd356.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7757edde8657313599e535a80d6fd356.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7757edde8657313599e535a80d6fd356.exe
-
Size
488KB
-
MD5
7757edde8657313599e535a80d6fd356
-
SHA1
0e994d38abc39686c584c9b8a0e9fb60289c4557
-
SHA256
623b9f298b4bc2806e320cada4e4f976e84cfe9ee2044503aa81591a020202a7
-
SHA512
4b46c6bb0bf22fb898de00f26819d898eb413919222ad9d24a9d8ceb4c8823319ac94c01d2b9cb1c6f6b3abdb8f8304c7b49c2295ecfe568239b24f7f23f9666
-
SSDEEP
12288:FytbV3kSoXaLnToslhxcQY93dC61434/Yj:Eb5kSYaLTVlhnuAY6
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 800 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2052 7757edde8657313599e535a80d6fd356.exe 2052 7757edde8657313599e535a80d6fd356.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 7757edde8657313599e535a80d6fd356.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1704 2052 7757edde8657313599e535a80d6fd356.exe 28 PID 2052 wrote to memory of 1704 2052 7757edde8657313599e535a80d6fd356.exe 28 PID 2052 wrote to memory of 1704 2052 7757edde8657313599e535a80d6fd356.exe 28 PID 1704 wrote to memory of 800 1704 cmd.exe 30 PID 1704 wrote to memory of 800 1704 cmd.exe 30 PID 1704 wrote to memory of 800 1704 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7757edde8657313599e535a80d6fd356.exe"C:\Users\Admin\AppData\Local\Temp\7757edde8657313599e535a80d6fd356.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7757edde8657313599e535a80d6fd356.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:800
-
-