Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 06:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b9e9ce40a86a50ff32da8f8a46f7711.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
8b9e9ce40a86a50ff32da8f8a46f7711.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
8b9e9ce40a86a50ff32da8f8a46f7711.exe
-
Size
644KB
-
MD5
8b9e9ce40a86a50ff32da8f8a46f7711
-
SHA1
918bc50d533add2ea5ab97e2c976c0e39f6d2f26
-
SHA256
cf2c5b39ac8f1f0d2b704889fde1fec36a557a25bf3024dd0c07f4fefd399557
-
SHA512
5262537590c934ef67921507c53443d4d42319d7ef43dddd451f47f7f662305b323678924aa3e614b8c016ec2f4ed48f70ef494544f41c92a2018976c4afba18
-
SSDEEP
12288:FytbV3kSoXaLnToslyy/GDYa6AqyTCh0z2NcRBlZdnZw4z4T5KE:Eb5kSYaLTVllGDB6cmWzJRBVZw7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2468 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 8b9e9ce40a86a50ff32da8f8a46f7711.exe 2184 8b9e9ce40a86a50ff32da8f8a46f7711.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 8b9e9ce40a86a50ff32da8f8a46f7711.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2468 2184 8b9e9ce40a86a50ff32da8f8a46f7711.exe 28 PID 2184 wrote to memory of 2468 2184 8b9e9ce40a86a50ff32da8f8a46f7711.exe 28 PID 2184 wrote to memory of 2468 2184 8b9e9ce40a86a50ff32da8f8a46f7711.exe 28 PID 2468 wrote to memory of 2724 2468 cmd.exe 30 PID 2468 wrote to memory of 2724 2468 cmd.exe 30 PID 2468 wrote to memory of 2724 2468 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b9e9ce40a86a50ff32da8f8a46f7711.exe"C:\Users\Admin\AppData\Local\Temp\8b9e9ce40a86a50ff32da8f8a46f7711.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8b9e9ce40a86a50ff32da8f8a46f7711.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2724
-
-