Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 17:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bc67871cac46b2a92fa89d6b9f7d34ed.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
bc67871cac46b2a92fa89d6b9f7d34ed.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
bc67871cac46b2a92fa89d6b9f7d34ed.exe
-
Size
528KB
-
MD5
bc67871cac46b2a92fa89d6b9f7d34ed
-
SHA1
356812b13c36177fd4a91bbb5c0a0a2450dd81be
-
SHA256
5a737ba84636a60ec1cc4e0a551b609cbf2c5e7fe5aadcf7e3d82ab0263c9c59
-
SHA512
46da2a2d2efd9ed70701dbabd0677d018ddd9cc81905201dade97084ee88e607e45c7fa3ffeac9f746f2edc5574eeff12fe08c25705baf097316912b60cda9a9
-
SSDEEP
12288:FytbV3kSoXaLnTosl+RMtOXGzGUDvDYUA/LPAUqifxSF:Eb5kSYaLTVl+RMtmGzDDPqQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2500 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2492 bc67871cac46b2a92fa89d6b9f7d34ed.exe 2492 bc67871cac46b2a92fa89d6b9f7d34ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2492 bc67871cac46b2a92fa89d6b9f7d34ed.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2684 2492 bc67871cac46b2a92fa89d6b9f7d34ed.exe 28 PID 2492 wrote to memory of 2684 2492 bc67871cac46b2a92fa89d6b9f7d34ed.exe 28 PID 2492 wrote to memory of 2684 2492 bc67871cac46b2a92fa89d6b9f7d34ed.exe 28 PID 2684 wrote to memory of 2500 2684 cmd.exe 30 PID 2684 wrote to memory of 2500 2684 cmd.exe 30 PID 2684 wrote to memory of 2500 2684 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc67871cac46b2a92fa89d6b9f7d34ed.exe"C:\Users\Admin\AppData\Local\Temp\bc67871cac46b2a92fa89d6b9f7d34ed.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\bc67871cac46b2a92fa89d6b9f7d34ed.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2500
-
-