Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 17:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
80a5b6a30ec939237e25b30d6a3d3ea0N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
Behavioral task
behavioral2
Sample
80a5b6a30ec939237e25b30d6a3d3ea0N.exe
Resource
win10v2004-20240802-en
5 signatures
120 seconds
General
-
Target
80a5b6a30ec939237e25b30d6a3d3ea0N.exe
-
Size
316KB
-
MD5
80a5b6a30ec939237e25b30d6a3d3ea0
-
SHA1
db6715e34479d44551a3fa65c91c916beccaad7f
-
SHA256
9ed336f39d6021481ffc42c5804308a0f34a70752a6fcede544e74019827f6e9
-
SHA512
80ab4f3e4a0cfaa11f9a00f791d210be73a543439cd6fcf7ec5493ffdddc2210dafa6874e8689fd61329de6d625d8254621ebebca4e56ca5d7b93b6ebf05002d
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEnoVLzH1hU4:FytbV3kSoXaLnTosltHjD
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2356 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2676 PING.EXE 2356 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2676 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 80a5b6a30ec939237e25b30d6a3d3ea0N.exe 2188 80a5b6a30ec939237e25b30d6a3d3ea0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 80a5b6a30ec939237e25b30d6a3d3ea0N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2356 2188 80a5b6a30ec939237e25b30d6a3d3ea0N.exe 30 PID 2188 wrote to memory of 2356 2188 80a5b6a30ec939237e25b30d6a3d3ea0N.exe 30 PID 2188 wrote to memory of 2356 2188 80a5b6a30ec939237e25b30d6a3d3ea0N.exe 30 PID 2356 wrote to memory of 2676 2356 cmd.exe 32 PID 2356 wrote to memory of 2676 2356 cmd.exe 32 PID 2356 wrote to memory of 2676 2356 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a5b6a30ec939237e25b30d6a3d3ea0N.exe"C:\Users\Admin\AppData\Local\Temp\80a5b6a30ec939237e25b30d6a3d3ea0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\80a5b6a30ec939237e25b30d6a3d3ea0N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2676
-
-