Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/09/2022, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe
Resource
win10v2004-20220812-en
General
-
Target
9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe
-
Size
25KB
-
MD5
94c26f4642d2d6edb9ebfbef9cfa0f82
-
SHA1
cf0416104a33144773c002b1bcd03be3edeebe5e
-
SHA256
9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543
-
SHA512
1b0727a2afb350b6b80e297fcf1a0a30a516047e638a588f5d2dcfc5b11eefc07b6d3ac3b7c7c541850ca34cf03e9c340edeae06efc0c05b6e827cb62b9dc2c6
-
SSDEEP
768:htkGbZ9xjXvKBBW5bkmG+GAjhXXntCQX:hlDjSBBWm+GIntr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 552 Warper.exe -
Loads dropped DLL 2 IoCs
pid Process 844 cmd.exe 844 cmd.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1464 PING.EXE 572 PING.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1204 wrote to memory of 844 1204 9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe 28 PID 1204 wrote to memory of 844 1204 9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe 28 PID 1204 wrote to memory of 844 1204 9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe 28 PID 1204 wrote to memory of 844 1204 9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe 28 PID 844 wrote to memory of 1464 844 cmd.exe 30 PID 844 wrote to memory of 1464 844 cmd.exe 30 PID 844 wrote to memory of 1464 844 cmd.exe 30 PID 844 wrote to memory of 1464 844 cmd.exe 30 PID 844 wrote to memory of 552 844 cmd.exe 31 PID 844 wrote to memory of 552 844 cmd.exe 31 PID 844 wrote to memory of 552 844 cmd.exe 31 PID 844 wrote to memory of 552 844 cmd.exe 31 PID 552 wrote to memory of 1132 552 Warper.exe 32 PID 552 wrote to memory of 1132 552 Warper.exe 32 PID 552 wrote to memory of 1132 552 Warper.exe 32 PID 552 wrote to memory of 1132 552 Warper.exe 32 PID 1132 wrote to memory of 572 1132 cmd.exe 34 PID 1132 wrote to memory of 572 1132 cmd.exe 34 PID 1132 wrote to memory of 572 1132 cmd.exe 34 PID 1132 wrote to memory of 572 1132 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe"C:\Users\Admin\AppData\Local\Temp\9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Warper.exe "C:\Users\Admin\AppData\Local\Temp\9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\Warper.exeWarper.exe "C:\Users\Admin\AppData\Local\Temp\9c7d9eb95a5bc534752d0a826392175f044db0a039ce533455dd24b6f1fae543.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Warper.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:572
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5590bc5f1869d323ee651603bc1db10c1
SHA1432059aa11209d7fbc4463d273016e07a74476d0
SHA256931d4a5c4316af1da106c397bbb26cb64986253101b826121a2aff3237da5435
SHA512b388daae2474838b188ef6331c3bbce30eb3b83379e2fe82bd150c204262b1128d0383e1509684722e1ec906c442d2daa4201a9d8023a6a199f8a17b0886f6dd
-
Filesize
10KB
MD5590bc5f1869d323ee651603bc1db10c1
SHA1432059aa11209d7fbc4463d273016e07a74476d0
SHA256931d4a5c4316af1da106c397bbb26cb64986253101b826121a2aff3237da5435
SHA512b388daae2474838b188ef6331c3bbce30eb3b83379e2fe82bd150c204262b1128d0383e1509684722e1ec906c442d2daa4201a9d8023a6a199f8a17b0886f6dd
-
Filesize
10KB
MD5590bc5f1869d323ee651603bc1db10c1
SHA1432059aa11209d7fbc4463d273016e07a74476d0
SHA256931d4a5c4316af1da106c397bbb26cb64986253101b826121a2aff3237da5435
SHA512b388daae2474838b188ef6331c3bbce30eb3b83379e2fe82bd150c204262b1128d0383e1509684722e1ec906c442d2daa4201a9d8023a6a199f8a17b0886f6dd
-
Filesize
10KB
MD5590bc5f1869d323ee651603bc1db10c1
SHA1432059aa11209d7fbc4463d273016e07a74476d0
SHA256931d4a5c4316af1da106c397bbb26cb64986253101b826121a2aff3237da5435
SHA512b388daae2474838b188ef6331c3bbce30eb3b83379e2fe82bd150c204262b1128d0383e1509684722e1ec906c442d2daa4201a9d8023a6a199f8a17b0886f6dd