7zS850A099E.zip
General
Target
Filesize
Completed
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
116KB
19-01-2022 08:13
Score
10/10
MD5
SHA1
SHA256
b8ecec542a07067a193637269973c2e8
97178479fd0fc608d6c0fbf243a0bb136d7b0ecb
fc6b5ec20b7f2c902e9413c71be5718eb58640d86189306fe4c592af70fe3b7e
Malware Config
Signatures 6
Filter: none
Defense Evasion
Discovery
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Description
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Tags
-
Deletes itselfcmd.exe
Reported IOCs
pid process 1592 cmd.exe -
Legitimate hosting services abused for malware hosting/C2
TTPs
-
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Runs ping.exePING.EXE
TTPs
Reported IOCs
pid process 1640 PING.EXE -
Suspicious use of WriteProcessMemory61e7502f007f3_Tue23d6fecf8c.execmd.exe
Reported IOCs
description pid process target process PID 480 wrote to memory of 1592 480 61e7502f007f3_Tue23d6fecf8c.exe cmd.exe PID 480 wrote to memory of 1592 480 61e7502f007f3_Tue23d6fecf8c.exe cmd.exe PID 480 wrote to memory of 1592 480 61e7502f007f3_Tue23d6fecf8c.exe cmd.exe PID 480 wrote to memory of 1592 480 61e7502f007f3_Tue23d6fecf8c.exe cmd.exe PID 1592 wrote to memory of 1640 1592 cmd.exe PING.EXE PID 1592 wrote to memory of 1640 1592 cmd.exe PING.EXE PID 1592 wrote to memory of 1640 1592 cmd.exe PING.EXE PID 1592 wrote to memory of 1640 1592 cmd.exe PING.EXE
Processes 3
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe" >> NULDeletes itselfSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1Runs ping.exe
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/480-55-0x0000000074EC1000-0x0000000074EC3000-memory.dmp
Title
Loading data