Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe
Resource
win10v2004-20240802-en
General
-
Target
041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe
-
Size
765KB
-
MD5
bb1613a2c3351f13b49aedd2df1e5fb0
-
SHA1
ad20bf3709cc45c9380a4870a39b388770e8971b
-
SHA256
041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3ca
-
SHA512
4c8822791c3524d9bb2cbfd8946c5439f977889a5a277e48b7352daae69fcd1167d101c8fa38fe0988962805fcd804305611cab86a27295992c4a5efef6334d2
-
SSDEEP
12288:fytbV3kSoXaLnToslAntbV3kSoXaLnTos65y3d38DXfrsunXBmF:+b5kSYaLTVl0b5kSYaLTVWy3m7rPnXBS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1232 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1232 cmd.exe 2772 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2772 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe 1152 041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1232 1152 041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe 31 PID 1152 wrote to memory of 1232 1152 041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe 31 PID 1152 wrote to memory of 1232 1152 041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe 31 PID 1232 wrote to memory of 2772 1232 cmd.exe 33 PID 1232 wrote to memory of 2772 1232 cmd.exe 33 PID 1232 wrote to memory of 2772 1232 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe"C:\Users\Admin\AppData\Local\Temp\041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\041e07a7f052171943b66a2c16695370c504e72aaccdb5dfd9aa3e30dc55b3caN.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2772
-
-