Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
ac967c204a3b3f8616ed384d21eee4e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac967c204a3b3f8616ed384d21eee4e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
ac967c204a3b3f8616ed384d21eee4e0N.exe
-
Size
697KB
-
MD5
ac967c204a3b3f8616ed384d21eee4e0
-
SHA1
8bbdcb580f7f74b2681e53d0902abcad997801b3
-
SHA256
be7ca8eef4c9357895f73feb686c2088c355801950223f4ef0778950f752ab30
-
SHA512
2e395d6ee217a6f1d737208bbdbcd26e83cebf434d6c058d363fb721087e4c73025599da0443ce523873f882c0c8b445a51875f499f4a1e7f5c497e169c96b51
-
SSDEEP
12288:7ytbV3kSoXaLnTosllBuXwbaNoK04AOv/d2irJZby/xZicJRsN2A8oxwZzM:6b5kSYaLTVll4gb804Xzy/xxRJr4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2660 cmd.exe 2820 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2820 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2276 ac967c204a3b3f8616ed384d21eee4e0N.exe 2276 ac967c204a3b3f8616ed384d21eee4e0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2276 ac967c204a3b3f8616ed384d21eee4e0N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2660 2276 ac967c204a3b3f8616ed384d21eee4e0N.exe 30 PID 2276 wrote to memory of 2660 2276 ac967c204a3b3f8616ed384d21eee4e0N.exe 30 PID 2276 wrote to memory of 2660 2276 ac967c204a3b3f8616ed384d21eee4e0N.exe 30 PID 2660 wrote to memory of 2820 2660 cmd.exe 32 PID 2660 wrote to memory of 2820 2660 cmd.exe 32 PID 2660 wrote to memory of 2820 2660 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac967c204a3b3f8616ed384d21eee4e0N.exe"C:\Users\Admin\AppData\Local\Temp\ac967c204a3b3f8616ed384d21eee4e0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\ac967c204a3b3f8616ed384d21eee4e0N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2820
-
-