Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 01:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
85992982a46f449b2c9dca37e0fedc80.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
85992982a46f449b2c9dca37e0fedc80.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
85992982a46f449b2c9dca37e0fedc80.exe
-
Size
544KB
-
MD5
85992982a46f449b2c9dca37e0fedc80
-
SHA1
061e4a764ff5499281f518ff1c9469b2a2f0d5ae
-
SHA256
14c27315bf3f8d190d980797c660fc2b1ca26de2c3f172e005f73c8da162836e
-
SHA512
dd9633875bb25b7dc28ddff237c4ca5740848c1c583877795c89b376319bca21f85787cf57353a9c8ba664b6c44378674d1c3e90d33a867b3a8c267503d648fc
-
SSDEEP
12288:FytbV3kSoXaLnToslRYHL6Tb1Q9GJUGgpbCFR:Eb5kSYaLTVl4qhcGJUHBQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 85992982a46f449b2c9dca37e0fedc80.exe 1948 85992982a46f449b2c9dca37e0fedc80.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 85992982a46f449b2c9dca37e0fedc80.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1684 1948 85992982a46f449b2c9dca37e0fedc80.exe 28 PID 1948 wrote to memory of 1684 1948 85992982a46f449b2c9dca37e0fedc80.exe 28 PID 1948 wrote to memory of 1684 1948 85992982a46f449b2c9dca37e0fedc80.exe 28 PID 1684 wrote to memory of 2196 1684 cmd.exe 30 PID 1684 wrote to memory of 2196 1684 cmd.exe 30 PID 1684 wrote to memory of 2196 1684 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\85992982a46f449b2c9dca37e0fedc80.exe"C:\Users\Admin\AppData\Local\Temp\85992982a46f449b2c9dca37e0fedc80.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\85992982a46f449b2c9dca37e0fedc80.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2196
-
-