Analysis
-
max time kernel
34s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:38
Behavioral task
behavioral1
Sample
37000c1856cbc7e59719ab74ab9724d2.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
37000c1856cbc7e59719ab74ab9724d2.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
37000c1856cbc7e59719ab74ab9724d2.exe
-
Size
1.2MB
-
MD5
37000c1856cbc7e59719ab74ab9724d2
-
SHA1
7b8ee9eabb08aa481ecd8b9b168ae52c8a906df4
-
SHA256
4b432a7a66293a8ec5b960d0bbb949d917cef95149eb55579c46a362987741fe
-
SHA512
721b1a322b9ffe021234ff03238c06c7ae5d82cfe9185df4437957f1ed30500548755980a7717fb275c0b11a22830e6e68e7c4a8ad5d94990747857f08544723
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
37000c1856cbc7e59719ab74ab9724d2.exe37000c1856cbc7e59719ab74ab9724d2.exepid process 1892 37000c1856cbc7e59719ab74ab9724d2.exe 884 37000c1856cbc7e59719ab74ab9724d2.exe 884 37000c1856cbc7e59719ab74ab9724d2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
37000c1856cbc7e59719ab74ab9724d2.execmd.exedescription pid process target process PID 1892 wrote to memory of 884 1892 37000c1856cbc7e59719ab74ab9724d2.exe 37000c1856cbc7e59719ab74ab9724d2.exe PID 1892 wrote to memory of 884 1892 37000c1856cbc7e59719ab74ab9724d2.exe 37000c1856cbc7e59719ab74ab9724d2.exe PID 1892 wrote to memory of 884 1892 37000c1856cbc7e59719ab74ab9724d2.exe 37000c1856cbc7e59719ab74ab9724d2.exe PID 1892 wrote to memory of 884 1892 37000c1856cbc7e59719ab74ab9724d2.exe 37000c1856cbc7e59719ab74ab9724d2.exe PID 1892 wrote to memory of 308 1892 37000c1856cbc7e59719ab74ab9724d2.exe cmd.exe PID 1892 wrote to memory of 308 1892 37000c1856cbc7e59719ab74ab9724d2.exe cmd.exe PID 1892 wrote to memory of 308 1892 37000c1856cbc7e59719ab74ab9724d2.exe cmd.exe PID 1892 wrote to memory of 308 1892 37000c1856cbc7e59719ab74ab9724d2.exe cmd.exe PID 308 wrote to memory of 1664 308 cmd.exe PING.EXE PID 308 wrote to memory of 1664 308 cmd.exe PING.EXE PID 308 wrote to memory of 1664 308 cmd.exe PING.EXE PID 308 wrote to memory of 1664 308 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\37000c1856cbc7e59719ab74ab9724d2.exe"C:\Users\Admin\AppData\Local\Temp\37000c1856cbc7e59719ab74ab9724d2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\37000c1856cbc7e59719ab74ab9724d2.exeC:\Users\Admin\AppData\Local\Temp\37000c1856cbc7e59719ab74ab9724d2.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\37000c1856cbc7e59719ab74ab9724d2.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe