Analysis
-
max time kernel
71s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16/04/2022, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
333d29ffe93e71b521057698adf722e3.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
333d29ffe93e71b521057698adf722e3.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
333d29ffe93e71b521057698adf722e3.exe
-
Size
1.9MB
-
MD5
333d29ffe93e71b521057698adf722e3
-
SHA1
61e2f011274d734599209767ab76cad136e8a94f
-
SHA256
5ed4ffbd9a1a1acd44f4859c39a49639babe515434ca34bec603598b50211bab
-
SHA512
ce17e506574e6f118ea735d748e4b79b83dfb20d066b30c63f7942fe5c5172f3c4cb7dd3bfeaa16ccf77e48b81f5ba8d57ad512163d48261708a622baed9409d
Score
5/10
Malware Config
Signatures
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming/Microsoft/Windows/Themes/TranscodedWallpaper.jpg" 333d29ffe93e71b521057698adf722e3.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1160 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 604 wrote to memory of 4116 604 333d29ffe93e71b521057698adf722e3.exe 79 PID 604 wrote to memory of 4116 604 333d29ffe93e71b521057698adf722e3.exe 79 PID 604 wrote to memory of 4116 604 333d29ffe93e71b521057698adf722e3.exe 79 PID 4116 wrote to memory of 1160 4116 cmd.exe 81 PID 4116 wrote to memory of 1160 4116 cmd.exe 81 PID 4116 wrote to memory of 1160 4116 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\333d29ffe93e71b521057698adf722e3.exe"C:\Users\Admin\AppData\Local\Temp\333d29ffe93e71b521057698adf722e3.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\333d29ffe93e71b521057698adf722e3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1160
-
-