Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 22:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c57ea2ea649c7a5b20e60926e1501d9c.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c57ea2ea649c7a5b20e60926e1501d9c.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
c57ea2ea649c7a5b20e60926e1501d9c.exe
-
Size
488KB
-
MD5
c57ea2ea649c7a5b20e60926e1501d9c
-
SHA1
3671a9923b1ddd5537b708971aca09c74e6f2942
-
SHA256
100fd90de082155e6e0cc2094735c22cb7575938a0fe15f52a60f5f3e7210fe0
-
SHA512
b0a55e7d08f6b4d4f1451d6836a103f82697a14a5679601b0d9c61973dc942f5371a03a6194ff05d1476875a749e2c4b29d85cea830c75497ef8584922e06053
-
SSDEEP
12288:FytbV3kSoXaLnToslPRWy7w+V7WdU+vuHK:Eb5kSYaLTVlPzhVWdaHK
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2944 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2136 c57ea2ea649c7a5b20e60926e1501d9c.exe 2136 c57ea2ea649c7a5b20e60926e1501d9c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2136 c57ea2ea649c7a5b20e60926e1501d9c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2952 2136 c57ea2ea649c7a5b20e60926e1501d9c.exe 28 PID 2136 wrote to memory of 2952 2136 c57ea2ea649c7a5b20e60926e1501d9c.exe 28 PID 2136 wrote to memory of 2952 2136 c57ea2ea649c7a5b20e60926e1501d9c.exe 28 PID 2952 wrote to memory of 2944 2952 cmd.exe 30 PID 2952 wrote to memory of 2944 2952 cmd.exe 30 PID 2952 wrote to memory of 2944 2952 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c57ea2ea649c7a5b20e60926e1501d9c.exe"C:\Users\Admin\AppData\Local\Temp\c57ea2ea649c7a5b20e60926e1501d9c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c57ea2ea649c7a5b20e60926e1501d9c.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2944
-
-