Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 11:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a3b2b9ad2161d19819d002186b4bffbc.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3b2b9ad2161d19819d002186b4bffbc.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
a3b2b9ad2161d19819d002186b4bffbc.exe
-
Size
488KB
-
MD5
a3b2b9ad2161d19819d002186b4bffbc
-
SHA1
ac5e64daf80d6343cfbe342ac510274563ecd67e
-
SHA256
c7cd57a4e5e369f056fe0e8eb4cab25d9ae7f53f7a4311dfcefdfe2e61cf621a
-
SHA512
5f915b7e68a3901b102dbba8107bba8daeb11e50a8fb1c310a1475dfcdcb614f18013fbbcf14df27c185842ab4cea134fbc15e327cc7e3f94efec9af1fa3825b
-
SSDEEP
12288:FytbV3kSoXaLnToslQvAPqnPhE4qiuwlV0jN:Eb5kSYaLTVlCoqnPjqip0jN
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1720 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2604 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 a3b2b9ad2161d19819d002186b4bffbc.exe 1752 a3b2b9ad2161d19819d002186b4bffbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 a3b2b9ad2161d19819d002186b4bffbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1720 1752 a3b2b9ad2161d19819d002186b4bffbc.exe 28 PID 1752 wrote to memory of 1720 1752 a3b2b9ad2161d19819d002186b4bffbc.exe 28 PID 1752 wrote to memory of 1720 1752 a3b2b9ad2161d19819d002186b4bffbc.exe 28 PID 1720 wrote to memory of 2604 1720 cmd.exe 30 PID 1720 wrote to memory of 2604 1720 cmd.exe 30 PID 1720 wrote to memory of 2604 1720 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3b2b9ad2161d19819d002186b4bffbc.exe"C:\Users\Admin\AppData\Local\Temp\a3b2b9ad2161d19819d002186b4bffbc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\a3b2b9ad2161d19819d002186b4bffbc.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2604
-
-