Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15/04/2022, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
333d29ffe93e71b521057698adf722e3.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
333d29ffe93e71b521057698adf722e3.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
333d29ffe93e71b521057698adf722e3.exe
-
Size
1.9MB
-
MD5
333d29ffe93e71b521057698adf722e3
-
SHA1
61e2f011274d734599209767ab76cad136e8a94f
-
SHA256
5ed4ffbd9a1a1acd44f4859c39a49639babe515434ca34bec603598b50211bab
-
SHA512
ce17e506574e6f118ea735d748e4b79b83dfb20d066b30c63f7942fe5c5172f3c4cb7dd3bfeaa16ccf77e48b81f5ba8d57ad512163d48261708a622baed9409d
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming/Microsoft/Windows/Themes/TranscodedWallpaper.jpg" 333d29ffe93e71b521057698adf722e3.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 996 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 780 wrote to memory of 1628 780 333d29ffe93e71b521057698adf722e3.exe 28 PID 780 wrote to memory of 1628 780 333d29ffe93e71b521057698adf722e3.exe 28 PID 780 wrote to memory of 1628 780 333d29ffe93e71b521057698adf722e3.exe 28 PID 780 wrote to memory of 1628 780 333d29ffe93e71b521057698adf722e3.exe 28 PID 1628 wrote to memory of 996 1628 cmd.exe 30 PID 1628 wrote to memory of 996 1628 cmd.exe 30 PID 1628 wrote to memory of 996 1628 cmd.exe 30 PID 1628 wrote to memory of 996 1628 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\333d29ffe93e71b521057698adf722e3.exe"C:\Users\Admin\AppData\Local\Temp\333d29ffe93e71b521057698adf722e3.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\333d29ffe93e71b521057698adf722e3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:996
-
-