Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 11:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
TestFKRT.exe
Resource
win7-20240508-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
TestFKRT.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
TestFKRT.exe
-
Size
375KB
-
MD5
7167b97b30f2650bc2fe30ea6aea8c60
-
SHA1
1df3d35a76b75545a092db90ad74a5732a52be00
-
SHA256
c38f9d7b02cb20690aae34a7b85ca91c95be43813ca609694d79a13111357bf4
-
SHA512
183fbe184aae509f5e7728316dc6e31e1505476dce42c17e433d0c3b1c6865bef55ff806ad359bd0dfb0e7d945d4ba11a7565067b88fec3f514ee3e3d4128b0c
-
SSDEEP
6144:MOGkB/vhyOc10KgGwHqwOOELha+sm2D2+UhngNQK4t6DqeLUEEiRgc5uJV/qb:vhzc10KgGXFhazmdVg+K4t6DqbEBuJV
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 4 bitbucket.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2764 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1640 TestFKRT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1640 TestFKRT.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2672 1640 TestFKRT.exe 28 PID 1640 wrote to memory of 2672 1640 TestFKRT.exe 28 PID 1640 wrote to memory of 2672 1640 TestFKRT.exe 28 PID 2672 wrote to memory of 2764 2672 cmd.exe 30 PID 2672 wrote to memory of 2764 2672 cmd.exe 30 PID 2672 wrote to memory of 2764 2672 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TestFKRT.exe"C:\Users\Admin\AppData\Local\Temp\TestFKRT.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3001 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\TestFKRT.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30013⤵
- Runs ping.exe
PID:2764
-
-