Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 15:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e1f8f5b70be42de1ee3a2641eb720b8b.exe
Resource
win7-20240319-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e1f8f5b70be42de1ee3a2641eb720b8b.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
e1f8f5b70be42de1ee3a2641eb720b8b.exe
-
Size
316KB
-
MD5
e1f8f5b70be42de1ee3a2641eb720b8b
-
SHA1
61bd35c92149a27b45fcec292da36316aa9e9007
-
SHA256
e1986a8e3bfc50c93e8f367829621226cb65e3257968ea758d1af26a2e26cd3a
-
SHA512
5579cf4270a2846c192e805fc1ea0010c9b67225a0f1d6705b926a92feca6ba0b60cc3f1ad8867f12543ecae3a4bdbd6370d24270cb5f57d8fa829b4f678e2fe
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEzQ1yFb84083:FytbV3kSoXaLnToslCQQ53
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 e1f8f5b70be42de1ee3a2641eb720b8b.exe 2348 e1f8f5b70be42de1ee3a2641eb720b8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 e1f8f5b70be42de1ee3a2641eb720b8b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2500 2348 e1f8f5b70be42de1ee3a2641eb720b8b.exe 28 PID 2348 wrote to memory of 2500 2348 e1f8f5b70be42de1ee3a2641eb720b8b.exe 28 PID 2348 wrote to memory of 2500 2348 e1f8f5b70be42de1ee3a2641eb720b8b.exe 28 PID 2500 wrote to memory of 1196 2500 cmd.exe 30 PID 2500 wrote to memory of 1196 2500 cmd.exe 30 PID 2500 wrote to memory of 1196 2500 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f8f5b70be42de1ee3a2641eb720b8b.exe"C:\Users\Admin\AppData\Local\Temp\e1f8f5b70be42de1ee3a2641eb720b8b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\e1f8f5b70be42de1ee3a2641eb720b8b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1196
-
-