Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 02:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c776d429435329a40deea23f28d390f3.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c776d429435329a40deea23f28d390f3.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
c776d429435329a40deea23f28d390f3.exe
-
Size
644KB
-
MD5
c776d429435329a40deea23f28d390f3
-
SHA1
c18f150e5ff3ffe0b0e476a4492b9f80df21eba5
-
SHA256
012ee2b288f02834fd452e7e0a62bbd2e48f5f57728770ceca6d58b53160dd6a
-
SHA512
634388f4f458621fbf00f722f4bda41f135d7790d04d20cd0c4edbf0756b5a7b66219b63187e59879f8aa9fad57b15a740f54b477ffb135a6fedff77b9bcb8a4
-
SSDEEP
12288:FytbV3kSoXaLnTosly5M5wis5YKe3VhzO1ZMyZNL7i0rLv:Eb5kSYaLTVls5YKeFhypaG
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1188 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2204 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 c776d429435329a40deea23f28d390f3.exe 3060 c776d429435329a40deea23f28d390f3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 c776d429435329a40deea23f28d390f3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1188 3060 c776d429435329a40deea23f28d390f3.exe 28 PID 3060 wrote to memory of 1188 3060 c776d429435329a40deea23f28d390f3.exe 28 PID 3060 wrote to memory of 1188 3060 c776d429435329a40deea23f28d390f3.exe 28 PID 1188 wrote to memory of 2204 1188 cmd.exe 30 PID 1188 wrote to memory of 2204 1188 cmd.exe 30 PID 1188 wrote to memory of 2204 1188 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c776d429435329a40deea23f28d390f3.exe"C:\Users\Admin\AppData\Local\Temp\c776d429435329a40deea23f28d390f3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c776d429435329a40deea23f28d390f3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2204
-
-