Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 09:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8eefb6ef80ac0cefd25c457a6fff11c0N.exe
Resource
win7-20240729-en
windows7-x64
6 signatures
120 seconds
Behavioral task
behavioral2
Sample
8eefb6ef80ac0cefd25c457a6fff11c0N.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
120 seconds
General
-
Target
8eefb6ef80ac0cefd25c457a6fff11c0N.exe
-
Size
316KB
-
MD5
8eefb6ef80ac0cefd25c457a6fff11c0
-
SHA1
e31ce92c8733f87588c32c2792fad1443f5df614
-
SHA256
e4c5f859a528c12cd60f3c536b551901cbde6f326d58445e86c7ff2aaffb999d
-
SHA512
b631943d48a8d5ea2eb76f5559952d254087a60c092c08bb5b66eaa516f51e32c70a8f2b9d1a0576a39663c133c4054df4fd26f1e6d51b72972cc46dc47c4cd7
-
SSDEEP
6144:aUORK1ttbV3kSobTYZGiNdniCoh+KiEp/KtKnGf5gP:aytbV3kSoXaLnToslw/KtK2W
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1820 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1820 cmd.exe 1184 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1184 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 8eefb6ef80ac0cefd25c457a6fff11c0N.exe 2876 8eefb6ef80ac0cefd25c457a6fff11c0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 8eefb6ef80ac0cefd25c457a6fff11c0N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1820 2876 8eefb6ef80ac0cefd25c457a6fff11c0N.exe 29 PID 2876 wrote to memory of 1820 2876 8eefb6ef80ac0cefd25c457a6fff11c0N.exe 29 PID 2876 wrote to memory of 1820 2876 8eefb6ef80ac0cefd25c457a6fff11c0N.exe 29 PID 1820 wrote to memory of 1184 1820 cmd.exe 31 PID 1820 wrote to memory of 1184 1820 cmd.exe 31 PID 1820 wrote to memory of 1184 1820 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eefb6ef80ac0cefd25c457a6fff11c0N.exe"C:\Users\Admin\AppData\Local\Temp\8eefb6ef80ac0cefd25c457a6fff11c0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8eefb6ef80ac0cefd25c457a6fff11c0N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1184
-
-