Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 16:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c909f509b98b9d597ce0fa48996ceb7e.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c909f509b98b9d597ce0fa48996ceb7e.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c909f509b98b9d597ce0fa48996ceb7e.exe
-
Size
488KB
-
MD5
c909f509b98b9d597ce0fa48996ceb7e
-
SHA1
eab290068353236f8d7f138c2c83ccc025abccc5
-
SHA256
de0eb2107cdd5542e9f538a68534e2c3a7b8737705e114547f10e0165cbc939e
-
SHA512
15295c2ad2d16cb27548f67e2248480676eb36a5f9eea4e07ca0924b2210b63354c4c8ef9a38c8d2e94ef8414f2cdbef17e69d14f6518b91c58f20797c97b1b6
-
SSDEEP
12288:FytbV3kSoXaLnToslxpPSgy9hGRQydtA16Tv:Eb5kSYaLTVl3SjCQydtlv
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2576 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2992 c909f509b98b9d597ce0fa48996ceb7e.exe 2992 c909f509b98b9d597ce0fa48996ceb7e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2992 c909f509b98b9d597ce0fa48996ceb7e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3068 2992 c909f509b98b9d597ce0fa48996ceb7e.exe 27 PID 2992 wrote to memory of 3068 2992 c909f509b98b9d597ce0fa48996ceb7e.exe 27 PID 2992 wrote to memory of 3068 2992 c909f509b98b9d597ce0fa48996ceb7e.exe 27 PID 3068 wrote to memory of 2576 3068 cmd.exe 29 PID 3068 wrote to memory of 2576 3068 cmd.exe 29 PID 3068 wrote to memory of 2576 3068 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c909f509b98b9d597ce0fa48996ceb7e.exe"C:\Users\Admin\AppData\Local\Temp\c909f509b98b9d597ce0fa48996ceb7e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c909f509b98b9d597ce0fa48996ceb7e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2576
-
-