Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
REJ.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
REJ.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
juggles.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
juggles.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
sag.dll
Resource
win7-20220812-en
General
-
Target
juggles.cmd
-
Size
287B
-
MD5
efe57aed27c2bbf4838b50159ea2d681
-
SHA1
b13e4a69874867d0de66d5fa836bfab2eeee74f6
-
SHA256
b86d813aedba63d8d3c2a926790838180adbf941187595cbb0ad6686b8599509
-
SHA512
e711875f47f7a4bcbbe2cdea145bdb42dcae4ef303300a8e8bd9991d9b9b85a19c64046daf563d96d3906c526b22ad429d9a6d7060a189eace6e826815a3f62f
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2920 PING.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1344 4904 cmd.exe 82 PID 4904 wrote to memory of 1344 4904 cmd.exe 82 PID 4904 wrote to memory of 2920 4904 cmd.exe 87 PID 4904 wrote to memory of 2920 4904 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\juggles.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\regsvr32.exeC:\Windows\\\\\\system32\\\\\\regsvr32.exe oslo\sag.dat2⤵PID:1344
-
-
C:\Windows\system32\PING.EXEping google.com2⤵
- Runs ping.exe
PID:2920
-