Analysis
-
max time kernel
55s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 20:55
Behavioral task
behavioral1
Sample
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe
Resource
win10v2004-20220812-en
General
-
Target
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe
-
Size
49KB
-
MD5
f9c31d3d243a5e6b7e9cf69cdf83426a
-
SHA1
0781bfd34b3b72e7e520800c23fc133ce4aff069
-
SHA256
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618
-
SHA512
eaf57defc88e9103794c22f3bd686835c9689a40cc18bd0affe4fdae536aea7403c25be9c3a8e2b301e33ff0a4c8ce91756f1c74833fbf6e5c79d820a673fcfe
-
SSDEEP
768:aaQRffPB31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YAD+eg0LBYL91Oe:aam318HxZATvnsblYO+eE
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\42B6.tmp.bmp" 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3504 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2652 5000 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 84 PID 5000 wrote to memory of 2652 5000 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 84 PID 5000 wrote to memory of 2652 5000 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 84 PID 2652 wrote to memory of 3504 2652 cmd.exe 86 PID 2652 wrote to memory of 3504 2652 cmd.exe 86 PID 2652 wrote to memory of 3504 2652 cmd.exe 86 PID 2652 wrote to memory of 308 2652 cmd.exe 87 PID 2652 wrote to memory of 308 2652 cmd.exe 87 PID 2652 wrote to memory of 308 2652 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe"C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 5 & fsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe" & del /q /f "C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 53⤵
- Runs ping.exe
PID:3504
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe"3⤵PID:308
-
-