Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-11-2020 09:42
Static task
static1
Behavioral task
behavioral1
Sample
99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe
-
Size
1.0MB
-
MD5
b4c4124ef49eef7085d34ddab3b4ae9f
-
SHA1
87e3ffc0b6274a3084d1b0f97af29037bcc317bf
-
SHA256
99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39
-
SHA512
20e0c48b4ada8916ef03cb92b92a9c3557327feaacb409bac648b8d50f1c7ae9d2ddc89ad931bfebaf5af8ac16b1a8a2012d2832facb015379748ad8d6946955
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exepid process 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe 1316 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe 1316 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.execmd.exedescription pid process target process PID 684 wrote to memory of 1316 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe PID 684 wrote to memory of 1316 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe PID 684 wrote to memory of 1316 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe PID 684 wrote to memory of 1316 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe PID 684 wrote to memory of 1352 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe cmd.exe PID 684 wrote to memory of 1352 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe cmd.exe PID 684 wrote to memory of 1352 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe cmd.exe PID 684 wrote to memory of 1352 684 99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe cmd.exe PID 1352 wrote to memory of 1604 1352 cmd.exe PING.EXE PID 1352 wrote to memory of 1604 1352 cmd.exe PING.EXE PID 1352 wrote to memory of 1604 1352 cmd.exe PING.EXE PID 1352 wrote to memory of 1604 1352 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe"C:\Users\Admin\AppData\Local\Temp\99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exeC:\Users\Admin\AppData\Local\Temp\99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\99dd144822a3644e0e0ffcd2e5c9b03b4ad1be6c6ad4699747ff1b1e124d6f39.exe.bin.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe