Analysis
-
max time kernel
90s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe
Resource
win10v2004-20220901-en
General
-
Target
66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe
-
Size
104KB
-
MD5
5ce56cd8b840e9001cfa6e3dea42bd90
-
SHA1
2e835f2925063186150ee4a01bc0b12d119f8e60
-
SHA256
66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f
-
SHA512
d52221497289a10e4a0f3f0e6b3471234b994bfb3bfb1505a35e3d71890acb6cbaa5c7ad1e10bc0432ea8fbc46ef5eb70a27ac4ec04d0d17dc9b919daf343ba1
-
SSDEEP
1536:KncV+xOS8UYMITP0UIDH3tdFVebtVI0p+A/DvXZv:X+xYP0N3t7VEtr4qD5
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3452 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4624 66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2128 4624 66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe 87 PID 4624 wrote to memory of 2128 4624 66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe 87 PID 4624 wrote to memory of 2128 4624 66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe 87 PID 2128 wrote to memory of 3452 2128 cmd.exe 89 PID 2128 wrote to memory of 3452 2128 cmd.exe 89 PID 2128 wrote to memory of 3452 2128 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe"C:\Users\Admin\AppData\Local\Temp\66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\c.bat&echo del "C:\Users\Admin\AppData\Local\Temp\66fca16ad646e29bf5d629fe0d046afddfbe371821e18fc7516b4d3620a4de5f.exe">>c:\c.bat&echo del c:\c.bat>>c:\c.bat&c:\c.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- Runs ping.exe
PID:3452
-
-