Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 05:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9652085feff694bba5655c872ded21ce.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
9652085feff694bba5655c872ded21ce.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
9652085feff694bba5655c872ded21ce.exe
-
Size
644KB
-
MD5
9652085feff694bba5655c872ded21ce
-
SHA1
f6fcfa607c23eab32e4f481d2804e941c85f77d9
-
SHA256
5605239c2949ebd47cf2e33cfc31c740f57aba52c03453fefe439fda79b20630
-
SHA512
97557a14d68b5dba09cb275c091e18c4ad2c1f7f4a022a7c49530fd2eb71bb62cbc2082094162e532bef82bda40731ee5ff66a6ef2dd20baf6656e0813dcbc19
-
SSDEEP
12288:FytbV3kSoXaLnToslK4Forb7QoeOk+cFq0/SLlCe3vEeENiQPH6Rad:Eb5kSYaLTVlK4ceOk+Oq0qL5EeRQ/ew
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2464 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 9652085feff694bba5655c872ded21ce.exe 2500 9652085feff694bba5655c872ded21ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2500 9652085feff694bba5655c872ded21ce.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2156 2500 9652085feff694bba5655c872ded21ce.exe 28 PID 2500 wrote to memory of 2156 2500 9652085feff694bba5655c872ded21ce.exe 28 PID 2500 wrote to memory of 2156 2500 9652085feff694bba5655c872ded21ce.exe 28 PID 2156 wrote to memory of 2464 2156 cmd.exe 30 PID 2156 wrote to memory of 2464 2156 cmd.exe 30 PID 2156 wrote to memory of 2464 2156 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9652085feff694bba5655c872ded21ce.exe"C:\Users\Admin\AppData\Local\Temp\9652085feff694bba5655c872ded21ce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\9652085feff694bba5655c872ded21ce.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2464
-
-