Analysis
-
max time kernel
63s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 02:00
Static task
static1
Behavioral task
behavioral1
Sample
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe
Resource
win10v2004-20220812-en
General
-
Target
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe
-
Size
870KB
-
MD5
52c4a85e8e74e8bd35d93de6ca77d770
-
SHA1
c36edbec6a72e0508e2b3234dc5507ba5a85955a
-
SHA256
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848
-
SHA512
3d27db49bd69cd13d49a5ad11d32f8ca9e2c9c28a494866ed9930a08b8ee00fd746197430178b10b091e95f30bade8df291a5301d40050222ea30b5ead8dce1e
-
SSDEEP
12288:6TdUA40cSXWUGEDtcVU2TkPl1q43B9dtqfIkmLTcF6OL0aMZuv70r7L:6iD0cUW7l7TkPlTjtCIh46OLdb787L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1132 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1328 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1132 1668 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 31 PID 1668 wrote to memory of 1132 1668 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 31 PID 1668 wrote to memory of 1132 1668 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 31 PID 1668 wrote to memory of 1132 1668 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 31 PID 1132 wrote to memory of 1328 1132 cmd.exe 33 PID 1132 wrote to memory of 1328 1132 cmd.exe 33 PID 1132 wrote to memory of 1328 1132 cmd.exe 33 PID 1132 wrote to memory of 1328 1132 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe"C:\Users\Admin\AppData\Local\Temp\5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1328
-
-