Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 02:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c432393ba8f41cbbcade72473c7b5c0N.exe
Resource
win7-20240705-en
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
4c432393ba8f41cbbcade72473c7b5c0N.exe
Resource
win10v2004-20240709-en
4 signatures
120 seconds
General
-
Target
4c432393ba8f41cbbcade72473c7b5c0N.exe
-
Size
538KB
-
MD5
4c432393ba8f41cbbcade72473c7b5c0
-
SHA1
e5d4d0cdc86629a68c566b94c43553632fbf4925
-
SHA256
cc7ce594e1da92030c80efb7d6e21eb750f6f594d8500ae629d7e0d3d5698afa
-
SHA512
af484982c501e378c0201e25f595c97a203c1ab20e3ce0d021ecdc718bd8ca7db48230c46f8bb5b1f0b8adfc4825e22ceecfcec9ecaba8a48a50524714c647bd
-
SSDEEP
12288:cytbV3kSoXaLnTosJGqsgu+dbhVlC4lHemxRPY2wiEHlSt:Hb5kSYaLTVJGqHu+dbh7HlHnEHlSt
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1796 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1320 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2988 4c432393ba8f41cbbcade72473c7b5c0N.exe 2988 4c432393ba8f41cbbcade72473c7b5c0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 4c432393ba8f41cbbcade72473c7b5c0N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1796 2988 4c432393ba8f41cbbcade72473c7b5c0N.exe 30 PID 2988 wrote to memory of 1796 2988 4c432393ba8f41cbbcade72473c7b5c0N.exe 30 PID 2988 wrote to memory of 1796 2988 4c432393ba8f41cbbcade72473c7b5c0N.exe 30 PID 1796 wrote to memory of 1320 1796 cmd.exe 32 PID 1796 wrote to memory of 1320 1796 cmd.exe 32 PID 1796 wrote to memory of 1320 1796 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c432393ba8f41cbbcade72473c7b5c0N.exe"C:\Users\Admin\AppData\Local\Temp\4c432393ba8f41cbbcade72473c7b5c0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4c432393ba8f41cbbcade72473c7b5c0N.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1320
-
-