Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 08:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
88ff8a84b8b4930454b26da56d1e1b83.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
88ff8a84b8b4930454b26da56d1e1b83.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
88ff8a84b8b4930454b26da56d1e1b83.exe
-
Size
316KB
-
MD5
88ff8a84b8b4930454b26da56d1e1b83
-
SHA1
03a39c397a4f5dc932884f062a8c84d75269c306
-
SHA256
908691d72b2db252de54745e08e77106f3ed42faaa09dea055c4598b44741c7f
-
SHA512
51c1b9e0e19a849642198c99f9633c9531ea72d8892b258b5db7b2e697d590ffb459b89d71b8cfb89b93c78034ef2ee577d2bde618c21c23836f455bd726472d
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEm0ipyw1oks:FytbV3kSoXaLnTosl2ipbjs
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2512 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2896 88ff8a84b8b4930454b26da56d1e1b83.exe 2896 88ff8a84b8b4930454b26da56d1e1b83.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2896 88ff8a84b8b4930454b26da56d1e1b83.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2532 2896 88ff8a84b8b4930454b26da56d1e1b83.exe 28 PID 2896 wrote to memory of 2532 2896 88ff8a84b8b4930454b26da56d1e1b83.exe 28 PID 2896 wrote to memory of 2532 2896 88ff8a84b8b4930454b26da56d1e1b83.exe 28 PID 2532 wrote to memory of 2512 2532 cmd.exe 30 PID 2532 wrote to memory of 2512 2532 cmd.exe 30 PID 2532 wrote to memory of 2512 2532 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ff8a84b8b4930454b26da56d1e1b83.exe"C:\Users\Admin\AppData\Local\Temp\88ff8a84b8b4930454b26da56d1e1b83.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\88ff8a84b8b4930454b26da56d1e1b83.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2512
-
-