Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 23:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b5f15782b634fc1b85c37f934f447806.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b5f15782b634fc1b85c37f934f447806.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b5f15782b634fc1b85c37f934f447806.exe
-
Size
316KB
-
MD5
b5f15782b634fc1b85c37f934f447806
-
SHA1
5c6ae35a7bd3280f02669ff955e013b40fe18e67
-
SHA256
504ec9c83889c5123958ab083b07dd9a876af1122408cdbe0983e69280315117
-
SHA512
86818780d53df3c84ace5237ef4ce18da4a81e2cd3b8031cc0e55441ba567f3b303613d4cfe879139e411eabd8be82d2c3d043923634c7a2400aa8a9d0412611
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEbaF3LIRdg2:FytbV3kSoXaLnToslQaF36P
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2228 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1976 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2376 b5f15782b634fc1b85c37f934f447806.exe 2376 b5f15782b634fc1b85c37f934f447806.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 b5f15782b634fc1b85c37f934f447806.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2228 2376 b5f15782b634fc1b85c37f934f447806.exe 27 PID 2376 wrote to memory of 2228 2376 b5f15782b634fc1b85c37f934f447806.exe 27 PID 2376 wrote to memory of 2228 2376 b5f15782b634fc1b85c37f934f447806.exe 27 PID 2228 wrote to memory of 1976 2228 cmd.exe 29 PID 2228 wrote to memory of 1976 2228 cmd.exe 29 PID 2228 wrote to memory of 1976 2228 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5f15782b634fc1b85c37f934f447806.exe"C:\Users\Admin\AppData\Local\Temp\b5f15782b634fc1b85c37f934f447806.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b5f15782b634fc1b85c37f934f447806.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1976
-
-