Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 07:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8e9fc569a8d8c1535019528bf229bfb0N.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
120 seconds
Behavioral task
behavioral2
Sample
8e9fc569a8d8c1535019528bf229bfb0N.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
120 seconds
General
-
Target
8e9fc569a8d8c1535019528bf229bfb0N.exe
-
Size
320KB
-
MD5
8e9fc569a8d8c1535019528bf229bfb0
-
SHA1
2b87c28c8da48c19d5eb2ae78e8fabb910ca6f0c
-
SHA256
0dd9c65bc7844019fabe7dc9a2bdc548d5fac1ef743fa3435b396933e52af00e
-
SHA512
743294f1cd419aef4e80f8f86dbd101af1f864868f6a4678cae4cfb2992a5c1ef1140059d308e2909e34e2cdf3b59478b327afe678a4f6ff501e6ca49ba060be
-
SSDEEP
6144:8UORK1ttbV3kSobTYZGiNdnijoh+EiIt4f/qwfg40cB/:8ytbV3kSoXaLnyosHqMCk/
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2740 PING.EXE 2384 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2740 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2632 8e9fc569a8d8c1535019528bf229bfb0N.exe 2632 8e9fc569a8d8c1535019528bf229bfb0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2632 8e9fc569a8d8c1535019528bf229bfb0N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2384 2632 8e9fc569a8d8c1535019528bf229bfb0N.exe 30 PID 2632 wrote to memory of 2384 2632 8e9fc569a8d8c1535019528bf229bfb0N.exe 30 PID 2632 wrote to memory of 2384 2632 8e9fc569a8d8c1535019528bf229bfb0N.exe 30 PID 2384 wrote to memory of 2740 2384 cmd.exe 32 PID 2384 wrote to memory of 2740 2384 cmd.exe 32 PID 2384 wrote to memory of 2740 2384 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e9fc569a8d8c1535019528bf229bfb0N.exe"C:\Users\Admin\AppData\Local\Temp\8e9fc569a8d8c1535019528bf229bfb0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8e9fc569a8d8c1535019528bf229bfb0N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2740
-
-