Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 22:15
Static task
static1
Behavioral task
behavioral1
Sample
3550/3962.cmd
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3550/3962.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
3550/candlestick.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
3550/candlestick.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
New_documents.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
New_documents.lnk
Resource
win10v2004-20220901-en
General
-
Target
3550/3962.cmd
-
Size
258B
-
MD5
de6c5be712cefeeae2fdb6e59c42d245
-
SHA1
6ce3877ce3afb219eba436abe92e09146ec21aa6
-
SHA256
ba1559f92485683a59224f7be9d6a1d6b89535037d9df2c93420f01263128a0e
-
SHA512
a36d94240562429924ab7f598caa56feb9c837bf702de84099dd6740cd55bc4c93260c613b9261c15ad4ae40647595a6190316dced7f7422f1179bee73a2b299
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 in.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4592 PING.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4592 4904 cmd.exe 82 PID 4904 wrote to memory of 4592 4904 cmd.exe 82 PID 4904 wrote to memory of 1996 4904 cmd.exe 87 PID 4904 wrote to memory of 1996 4904 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\3550\3962.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\PING.EXEping google.com2⤵
- Runs ping.exe
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\in.exeC:\Users\Admin\AppData\Local\Temp\\in.exe 3550\candlestick.dat2⤵
- Executes dropped EXE
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022