Analysis
-
max time kernel
60s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe
Resource
win10v2004-20220812-en
General
-
Target
49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe
-
Size
23KB
-
MD5
4d8e92e19c4e94903d25f9694a866b44
-
SHA1
78a59d945b075d4df9da4236ec0a3c86be509f73
-
SHA256
49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa
-
SHA512
87edacd5f47bbf7490453fe47136628a5bbd8969a983a4e067bdf99e02479afaca59dc014562dab1b7c19ef7a0e21e28c250ef96723998634027a311444640cf
-
SSDEEP
384:5hSkOtKXGOukQ7oEp9VldGmAcz1lH3qvS0sb6KGZt+gcR6Y+Z/GlSabUy7aXc9m3:5FyKXh0ows+eBSGZt/YA/GQaxY3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1236 cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1564 PING.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1236 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe 30 PID 1012 wrote to memory of 1236 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe 30 PID 1012 wrote to memory of 1236 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe 30 PID 1012 wrote to memory of 1236 1012 49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe 30 PID 1236 wrote to memory of 1564 1236 cmd.exe 32 PID 1236 wrote to memory of 1564 1236 cmd.exe 32 PID 1236 wrote to memory of 1564 1236 cmd.exe 32 PID 1236 wrote to memory of 1564 1236 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe"C:\Users\Admin\AppData\Local\Temp\49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\c.bat&echo del "C:\Users\Admin\AppData\Local\Temp\49de49239bd5d460041e28e456a0835cf0f9188b245c23342ccdb743f78179fa.exe">>c:\c.bat&echo del c:\c.bat>>c:\c.bat&c:\c.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- Runs ping.exe
PID:1564
-
-