Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe
Resource
win10v2004-20240802-en
General
-
Target
76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe
-
Size
697KB
-
MD5
022aaccfba2a8e38f36acfadebbc0d70
-
SHA1
93956cd7791fa9e644a63bee58652eb5b3f2631f
-
SHA256
76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514
-
SHA512
4d8559fad5a16768a3c39ba019d3b98a886fb1ccd83c174755da0e39cd8ca7d7ab72cbe8d8c9fbb4d9118c55201e47e33417daaa056fe544696dfc9a56f6e847
-
SSDEEP
12288:7ytbV3kSoXaLnTosllBue9m+/7HWlTya+6FlHki+keQF7FMeHhkwO:6b5kSYaLTVll4EzWTe6Fxki+kV7FMAaz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1712 PING.EXE 2016 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1712 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2552 76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe 2552 76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2016 2552 76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe 30 PID 2552 wrote to memory of 2016 2552 76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe 30 PID 2552 wrote to memory of 2016 2552 76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe 30 PID 2016 wrote to memory of 1712 2016 cmd.exe 32 PID 2016 wrote to memory of 1712 2016 cmd.exe 32 PID 2016 wrote to memory of 1712 2016 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe"C:\Users\Admin\AppData\Local\Temp\76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\76369fe80467d7d7a3100247b492013904d3648013df3a836983602883af5514N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1712
-
-