Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 21:52
Behavioral task
behavioral1
Sample
a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe
Resource
win7-20240708-en
windows7-x64
9 signatures
150 seconds
General
-
Target
a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe
-
Size
15.4MB
-
MD5
776d151df59df7a7d0ed00b0a7dafb05
-
SHA1
e465ba8a5c73f646375e88d255d66db5f7b3d84b
-
SHA256
a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899
-
SHA512
94eacabe3a42bcc45c28e6bc1ce35e0b5a6e32e2f24c9ed39b75a9737ee87eae74c19111c86cfcd3e48a6b7dab6797f8f703d8aaf0780e94e7650c2d752219c7
-
SSDEEP
393216:Ga3YWs8A1eHuNPWWXNJNg4m4ld6bS82KlGMJmAeqn:oKuNPnXDPkG8xl7EOn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1476 cmd.exe -
resource yara_rule behavioral1/memory/2644-36-0x000000013F890000-0x00000001415BA000-memory.dmp vmprotect behavioral1/memory/2644-39-0x000000013F890000-0x00000001415BA000-memory.dmp vmprotect behavioral1/memory/2644-96-0x000000013F890000-0x00000001415BA000-memory.dmp vmprotect -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2676 PATHPING.exe 1476 cmd.exe 1860 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1860 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 2676 PATHPING.exe 2676 PATHPING.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe Token: SeDebugPrivilege 2676 PATHPING.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 2676 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 31 PID 2644 wrote to memory of 1476 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 33 PID 2644 wrote to memory of 1476 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 33 PID 2644 wrote to memory of 1476 2644 a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe 33 PID 2676 wrote to memory of 2068 2676 PATHPING.exe 34 PID 2676 wrote to memory of 2068 2676 PATHPING.exe 34 PID 2676 wrote to memory of 2068 2676 PATHPING.exe 34 PID 1476 wrote to memory of 1860 1476 cmd.exe 36 PID 1476 wrote to memory of 1860 1476 cmd.exe 36 PID 1476 wrote to memory of 1860 1476 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe"C:\Users\Admin\AppData\Local\Temp\a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\PATHPING.exe"C:\Windows\System32\PATHPING.exe" panel.owswan.co -p 6553599660000 -w 6553599660000 -q 100 -h 2002⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2676 -s 2283⤵PID:2068
-
-
-
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\a7a0c537858e5cb89052d554b03682bbf3982bb49e92ce2ac8ce06448990c899.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1860
-
-