Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 08:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b44c7aecb8bb6788ce4b29965741f041.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b44c7aecb8bb6788ce4b29965741f041.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
b44c7aecb8bb6788ce4b29965741f041.exe
-
Size
316KB
-
MD5
b44c7aecb8bb6788ce4b29965741f041
-
SHA1
cdc027178e643c7a3d7d887287531e6cd73bffbd
-
SHA256
31fe2ba55bde6d484745138aca907cd9b7c770e13c378ba3d1b5c602f841652a
-
SHA512
fb96ceef7f0a4fd77badc6f3c206d041192c26491b9aa00da52a22806e963226e38c447cbfd2fdb0b2417ec26736df7ff85746eb48ea1351b6a42991d6bd1859
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEPtRiM:FytbV3kSoXaLnToslutRZ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2872 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1132 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 b44c7aecb8bb6788ce4b29965741f041.exe 3012 b44c7aecb8bb6788ce4b29965741f041.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 b44c7aecb8bb6788ce4b29965741f041.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2872 3012 b44c7aecb8bb6788ce4b29965741f041.exe 28 PID 3012 wrote to memory of 2872 3012 b44c7aecb8bb6788ce4b29965741f041.exe 28 PID 3012 wrote to memory of 2872 3012 b44c7aecb8bb6788ce4b29965741f041.exe 28 PID 2872 wrote to memory of 1132 2872 cmd.exe 30 PID 2872 wrote to memory of 1132 2872 cmd.exe 30 PID 2872 wrote to memory of 1132 2872 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44c7aecb8bb6788ce4b29965741f041.exe"C:\Users\Admin\AppData\Local\Temp\b44c7aecb8bb6788ce4b29965741f041.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b44c7aecb8bb6788ce4b29965741f041.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1132
-
-