Analysis
-
max time kernel
140s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe
Resource
win10v2004-20220812-en
General
-
Target
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe
-
Size
870KB
-
MD5
52c4a85e8e74e8bd35d93de6ca77d770
-
SHA1
c36edbec6a72e0508e2b3234dc5507ba5a85955a
-
SHA256
5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848
-
SHA512
3d27db49bd69cd13d49a5ad11d32f8ca9e2c9c28a494866ed9930a08b8ee00fd746197430178b10b091e95f30bade8df291a5301d40050222ea30b5ead8dce1e
-
SSDEEP
12288:6TdUA40cSXWUGEDtcVU2TkPl1q43B9dtqfIkmLTcF6OL0aMZuv70r7L:6iD0cUW7l7TkPlTjtCIh46OLdb787L
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2084 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1084 4212 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 82 PID 4212 wrote to memory of 1084 4212 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 82 PID 4212 wrote to memory of 1084 4212 5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe 82 PID 1084 wrote to memory of 2084 1084 cmd.exe 84 PID 1084 wrote to memory of 2084 1084 cmd.exe 84 PID 1084 wrote to memory of 2084 1084 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe"C:\Users\Admin\AppData\Local\Temp\5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5d83741a35db58006f01fc8a6a4fa2188dadccc40ace4b0afa9b6744ec980848.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2084
-
-