Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe
Resource
win10v2004-20240802-en
General
-
Target
3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe
-
Size
934KB
-
MD5
3f6329813061ec44217ab11391369510
-
SHA1
c61d3785ff189fbdefaebe7fd8e442e9b333b07a
-
SHA256
3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246
-
SHA512
bf6d7526134db39c6615ad1e7aca411bf743173f8237f179152eb19fd3fba1ef327d1ed45dbb9407c0f840ad989bc1260613d3d4084770a9b95fe3a929ed23f8
-
SSDEEP
12288:xytbV3kSoXaLnToslaosNxDo/9ThJ+NlPvOF89TyPlEM/mj00ZRHWfsmLga3:Qb5kSYaLTVlaVNxUTGbTkJ/mnHXyg6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2712 PING.EXE 2732 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2712 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe 2792 3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2732 2792 3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe 30 PID 2792 wrote to memory of 2732 2792 3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe 30 PID 2792 wrote to memory of 2732 2792 3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe 30 PID 2732 wrote to memory of 2712 2732 cmd.exe 32 PID 2732 wrote to memory of 2712 2732 cmd.exe 32 PID 2732 wrote to memory of 2712 2732 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe"C:\Users\Admin\AppData\Local\Temp\3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3fbc646626bc3f3f389bb6f51be036d9779d8a043e551b878efa53fe31682246N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2712
-
-