Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe
Resource
win10v2004-20241007-en
General
-
Target
37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe
-
Size
934KB
-
MD5
eb3f7e7b2a2dc5db899f5c174e36d180
-
SHA1
d59c0bafb68d5119f96c28e972324dae472d53f1
-
SHA256
37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1a
-
SHA512
c199cf173ad93fc8aa4c43efb3d6c4ae5d50924bb93db5e1e589374806e82503f92bb73d446276a572d84cd76922a97e7547659a984a2f985ffe46a006843db9
-
SSDEEP
12288:xytbV3kSoXaLnToslaosNxDo/9ThJ+NlPvOF89ThOHKZ7P3Xc9lm6RUfX:Qb5kSYaLTVlaVNxUTGbThOHK89c6RYX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2564 cmd.exe 3000 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3000 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2140 37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe 2140 37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2564 2140 37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe 30 PID 2140 wrote to memory of 2564 2140 37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe 30 PID 2140 wrote to memory of 2564 2140 37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe 30 PID 2564 wrote to memory of 3000 2564 cmd.exe 32 PID 2564 wrote to memory of 3000 2564 cmd.exe 32 PID 2564 wrote to memory of 3000 2564 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe"C:\Users\Admin\AppData\Local\Temp\37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\37c6c1778a1173d9fac323c1f4c872b055ff6e9b7e9659492fd58882e6d01d1aN.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3000
-
-