Analysis
-
max time kernel
114s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe
Resource
win10v2004-20240802-en
General
-
Target
716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe
-
Size
538KB
-
MD5
434a86d218dfdd94e7a102d317978570
-
SHA1
f8fa872331d9fa7e853c330b4351c17a21e540c7
-
SHA256
716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075
-
SHA512
f7ad15740361d18e4070b638e2c173110dba425f4f3920ba3e8a3f9dbe340132da11344e18883cafd9bffdd9d314055bb8faae19af62a78fa926601cbcf385b5
-
SSDEEP
12288:cytbV3kSoXaLnTosJGdaWcLKeAxXe/b9x3IXB:Hb5kSYaLTVJGdzfeA5enEB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2752 cmd.exe 3016 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3016 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe 2700 716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2752 2700 716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe 30 PID 2700 wrote to memory of 2752 2700 716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe 30 PID 2700 wrote to memory of 2752 2700 716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe 30 PID 2752 wrote to memory of 3016 2752 cmd.exe 32 PID 2752 wrote to memory of 3016 2752 cmd.exe 32 PID 2752 wrote to memory of 3016 2752 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe"C:\Users\Admin\AppData\Local\Temp\716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\716b41d9e3ca66f64e82a4def163d7ac49b7650b11bee00c1dd3e8eb8c153075N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3016
-
-