Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe
Resource
win10v2004-20241007-en
General
-
Target
8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe
-
Size
316KB
-
MD5
2cd7aad24fe7d9de136ff2bcb3df4e80
-
SHA1
abadf0b3b94f5f68183af0b45de25e54bcdb8ea2
-
SHA256
8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601
-
SHA512
d47df6b8b6b9923803d90d4bcd7f63f16bcc1165062137c55de63d8694b3ebde3accba4be04cf3bc23fbdb4c9d65ee9a77df2925885b0ec33323af47ee73181f
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEta3e0:FytbV3kSoXaLnTosl/3j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2760 PING.EXE 2688 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2760 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2140 8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe 2140 8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2688 2140 8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe 30 PID 2140 wrote to memory of 2688 2140 8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe 30 PID 2140 wrote to memory of 2688 2140 8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe 30 PID 2688 wrote to memory of 2760 2688 cmd.exe 32 PID 2688 wrote to memory of 2760 2688 cmd.exe 32 PID 2688 wrote to memory of 2760 2688 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe"C:\Users\Admin\AppData\Local\Temp\8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8caafe7bd5fda5a82548bd7fcc2501a53a44897d245aafa2413cf907f015c601N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2760
-
-