Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 12:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df2cfbe1d01b4ecf0f4fbed3e3035b02.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
df2cfbe1d01b4ecf0f4fbed3e3035b02.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
df2cfbe1d01b4ecf0f4fbed3e3035b02.exe
-
Size
488KB
-
MD5
df2cfbe1d01b4ecf0f4fbed3e3035b02
-
SHA1
1eb71c41b4c87abed96b6e420c75d9229d8dea47
-
SHA256
9e86d930f79e707d74a7cd47708df9153d23bdf7c352dcf6316bd25d23c522c6
-
SHA512
afd5775d5ca95beceaeaafdce229bc871c77a7d973929e82606ec7ff806fcc381186bc80d5a123353049a535d22d5db7407b18ce5d37333c1f576fa8315a7f9f
-
SSDEEP
12288:FytbV3kSoXaLnToslgNv6dseDgDbRg0OZ:Eb5kSYaLTVlgB6URgvZ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1528 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1544 df2cfbe1d01b4ecf0f4fbed3e3035b02.exe 1544 df2cfbe1d01b4ecf0f4fbed3e3035b02.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1544 df2cfbe1d01b4ecf0f4fbed3e3035b02.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2308 1544 df2cfbe1d01b4ecf0f4fbed3e3035b02.exe 28 PID 1544 wrote to memory of 2308 1544 df2cfbe1d01b4ecf0f4fbed3e3035b02.exe 28 PID 1544 wrote to memory of 2308 1544 df2cfbe1d01b4ecf0f4fbed3e3035b02.exe 28 PID 2308 wrote to memory of 1528 2308 cmd.exe 30 PID 2308 wrote to memory of 1528 2308 cmd.exe 30 PID 2308 wrote to memory of 1528 2308 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\df2cfbe1d01b4ecf0f4fbed3e3035b02.exe"C:\Users\Admin\AppData\Local\Temp\df2cfbe1d01b4ecf0f4fbed3e3035b02.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\df2cfbe1d01b4ecf0f4fbed3e3035b02.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1528
-
-