Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 17:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bc5dfeabc168bf969e15909f2d2577b2.exe
Resource
win7-20240215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
bc5dfeabc168bf969e15909f2d2577b2.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
bc5dfeabc168bf969e15909f2d2577b2.exe
-
Size
2.2MB
-
MD5
bc5dfeabc168bf969e15909f2d2577b2
-
SHA1
5f3f8dbac8d16976f9674aca971e9c146a35a802
-
SHA256
2aa865917f931f470829f59e972a2c877e71b20a2a154830b54bb580762c5297
-
SHA512
8ed362b7b134760149b4b625408256d93609dcf8c8eb57a9ce359b3138303d108f31c65940bd71da60f5073c1c96cce04d8ac5a40f561ea65582db12804de757
-
SSDEEP
49152:Eb5k2L5+vwG7u7OCXvN3wB4YdjAc3vl7wcgKM9xmlSikPWiq:EP57Omv66YdUcf5VMvikuiq
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 bc5dfeabc168bf969e15909f2d2577b2.exe 2240 bc5dfeabc168bf969e15909f2d2577b2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 bc5dfeabc168bf969e15909f2d2577b2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3024 2240 bc5dfeabc168bf969e15909f2d2577b2.exe 28 PID 2240 wrote to memory of 3024 2240 bc5dfeabc168bf969e15909f2d2577b2.exe 28 PID 2240 wrote to memory of 3024 2240 bc5dfeabc168bf969e15909f2d2577b2.exe 28 PID 3024 wrote to memory of 1524 3024 cmd.exe 30 PID 3024 wrote to memory of 1524 3024 cmd.exe 30 PID 3024 wrote to memory of 1524 3024 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc5dfeabc168bf969e15909f2d2577b2.exe"C:\Users\Admin\AppData\Local\Temp\bc5dfeabc168bf969e15909f2d2577b2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\bc5dfeabc168bf969e15909f2d2577b2.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1524
-
-