Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 11:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cdfa2d345acc4baeca58296698708f5a.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cdfa2d345acc4baeca58296698708f5a.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
cdfa2d345acc4baeca58296698708f5a.exe
-
Size
488KB
-
MD5
cdfa2d345acc4baeca58296698708f5a
-
SHA1
3f2dff2299f9b62c55434cc3f34192280b4d323b
-
SHA256
e2b20fcbcef20fd1bc0bcb0c6f03b860e92648890a6d2ef650dd45b73c690003
-
SHA512
c639b2d1a0fd8a0b077c5b15b50d3575d52963b077e22e9cb751b6e76a0191825d914eb1ef862acfe1d03a02c497c6b93f9ee2d71f45954cc94f4cf6d6a7c4c9
-
SSDEEP
12288:FytbV3kSoXaLnTosl/FlWLaASZ/TbEToKH:Eb5kSYaLTVlbmTShYToKH
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2836 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2860 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1888 cdfa2d345acc4baeca58296698708f5a.exe 1888 cdfa2d345acc4baeca58296698708f5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1888 cdfa2d345acc4baeca58296698708f5a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2836 1888 cdfa2d345acc4baeca58296698708f5a.exe 28 PID 1888 wrote to memory of 2836 1888 cdfa2d345acc4baeca58296698708f5a.exe 28 PID 1888 wrote to memory of 2836 1888 cdfa2d345acc4baeca58296698708f5a.exe 28 PID 2836 wrote to memory of 2860 2836 cmd.exe 30 PID 2836 wrote to memory of 2860 2836 cmd.exe 30 PID 2836 wrote to memory of 2860 2836 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdfa2d345acc4baeca58296698708f5a.exe"C:\Users\Admin\AppData\Local\Temp\cdfa2d345acc4baeca58296698708f5a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\cdfa2d345acc4baeca58296698708f5a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2860
-
-