Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe
Resource
win10v2004-20240508-en
General
-
Target
be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe
-
Size
320KB
-
MD5
2a1a59e44b2f257c61fa910f95a62e50
-
SHA1
c9023dbfffd9ce2626da53550f1fe6f8ea9370d3
-
SHA256
be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888
-
SHA512
554f2de39bdc92544f35ebc5e471c4aed588b7fca8f4444bd58b5499f32df4ba60b68d7c41cea8e241695ee378945d1cfb8ed9445b573efb7ab4f6f266e3442d
-
SSDEEP
6144:8UORK1ttbV3kSobTYZGiNdnijoh+EiIt4f/qzPi5L:8ytbV3kSoXaLnyosHqMCOd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2636 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2236 be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe 2236 be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2096 2236 be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe 28 PID 2236 wrote to memory of 2096 2236 be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe 28 PID 2236 wrote to memory of 2096 2236 be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe 28 PID 2096 wrote to memory of 2636 2096 cmd.exe 30 PID 2096 wrote to memory of 2636 2096 cmd.exe 30 PID 2096 wrote to memory of 2636 2096 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe"C:\Users\Admin\AppData\Local\Temp\be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\be9d1268fd1d0c0a906565eb8691d7b816d4eeb008298e39299e079203843888.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2636
-
-