Analysis

  • max time kernel
    102s
  • max time network
    79s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 11:43

General

  • Target

    2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98.exe

  • Size

    216KB

  • MD5

    a7374d90ed33df27a9a102c02d90bfaa

  • SHA1

    5dd3756b00edf6f9c2189a4e4fad1f76e109e368

  • SHA256

    2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98

  • SHA512

    2c3a91e30990d99429118c6373ed66d14a79fbde1335609d07307a3b9aa7c29ecef2b70deda0a3ae760ceb36edd4f083c7bcfa4bb0f5007132da7136eda176fa

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98.exe
    "C:\Users\Admin\AppData\Local\Temp\2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 8 & start "" "C:\Users\Admin\AppData\Local\Temp\2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98.exe" mscp ahis & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 8
        3⤵
        • Runs ping.exe
        PID:2252
      • C:\Users\Admin\AppData\Local\Temp\2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98.exe
        "C:\Users\Admin\AppData\Local\Temp\2413cf70c27e8928cf85acc4aa9ea6747d18d4a1032830963886fc0a460b0e98.exe" mscp ahis
        3⤵
          PID:2060

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/628-114-0x00000000007D0000-0x00000000007FA000-memory.dmp
      Filesize

      168KB

    • memory/1704-116-0x0000000000000000-mapping.dmp
    • memory/2060-118-0x0000000000000000-mapping.dmp
    • memory/2060-119-0x0000000001150000-0x000000000117A000-memory.dmp
      Filesize

      168KB

    • memory/2252-117-0x0000000000000000-mapping.dmp