Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe
Resource
win10v2004-20240802-en
General
-
Target
6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe
-
Size
316KB
-
MD5
7fbdfe9c6d071d493b800e53abe48d0b
-
SHA1
634c83a89f5f63435e5739e757e79f2056e44dce
-
SHA256
6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7
-
SHA512
a85a34d340d47a0dd955174ac47bd25a85461b5ab6d8ffe0628b831158055e184ee1ea5fe356278850e339dd19d908c93d944984cd570dd559db5afb65ffbeef
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiE9aL9MLpZU:FytbV3kSoXaLnTosl0geLpm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2240 cmd.exe 2708 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2708 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2232 6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe 2232 6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2232 6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2240 2232 6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe 30 PID 2232 wrote to memory of 2240 2232 6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe 30 PID 2232 wrote to memory of 2240 2232 6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe 30 PID 2240 wrote to memory of 2708 2240 cmd.exe 32 PID 2240 wrote to memory of 2708 2240 cmd.exe 32 PID 2240 wrote to memory of 2708 2240 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe"C:\Users\Admin\AppData\Local\Temp\6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6e63d024ceafa00232eb7ce08c3338073f649d3923c28d3e122563bf9a7c1cd7.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2708
-
-