Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 05:16
Static task
static1
Behavioral task
behavioral1
Sample
0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe
Resource
win10v2004-20220812-en
General
-
Target
0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe
-
Size
8KB
-
MD5
71176370db1e3fff438b34458f8d1893
-
SHA1
0a2de3bbba6f4f1af95f4f39125750b085cb571f
-
SHA256
0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4
-
SHA512
29028714dd3fe47cb3b6e879e58ab809f745c2fb51779753dccf6b49262366dcbaacbad3c60922e954045fd305ea7658bb7460fbe6f0827b1df59f167b213aa6
-
SSDEEP
192:MrkRRkUvxMPuhoMNqS2ObqDuGUmm5PhZKy323fap:MrkRR3vxizMNqfObqqG/MPhZe3fY
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4888 PING.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4676 0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe 4676 0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe 4676 0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4980 4676 0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe 83 PID 4676 wrote to memory of 4980 4676 0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe 83 PID 4676 wrote to memory of 4980 4676 0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe 83 PID 4980 wrote to memory of 4888 4980 cmd.exe 85 PID 4980 wrote to memory of 4888 4980 cmd.exe 85 PID 4980 wrote to memory of 4888 4980 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe"C:\Users\Admin\AppData\Local\Temp\0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\2.bat&echo del "C:\Users\Admin\AppData\Local\Temp\0093864ea481886c11cad5e9811a85740f56e0a84095974dd65365964d0b93e4.exe">>c:\2.bat&echo del c:\2.bat>>c:\2.bat&c:\2.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- Runs ping.exe
PID:4888
-
-