Analysis
-
max time kernel
175s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:54
Behavioral task
behavioral1
Sample
4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe
Resource
win10v2004-20220812-en
General
-
Target
4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe
-
Size
709KB
-
MD5
4ec1700818e444ecb944b8037fd49b49
-
SHA1
8772dec3229c85509d569d8921292d1290cf4230
-
SHA256
4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35
-
SHA512
14cd49c9608f79e9f993cb5eb5ffe9923d4d06fa2282358cbf7270479d0b092f4980b76ce77ffb58298f07548bcc923a4d50f36d8f36ffeb2aceca792eeb445a
-
SSDEEP
12288:vDk+EGgVPlD/yegDJdE6KeaqhJHvkPHJiVqTaB01GqQbQlVZ+QHpfuC0:o+xgVPlryeIdE6xhJcPHJiV93fbdEu
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exepid process 4860 4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe 4860 4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.execmd.exedescription pid process target process PID 4860 wrote to memory of 4872 4860 4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe cmd.exe PID 4860 wrote to memory of 4872 4860 4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe cmd.exe PID 4860 wrote to memory of 4872 4860 4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe cmd.exe PID 4872 wrote to memory of 4148 4872 cmd.exe PING.EXE PID 4872 wrote to memory of 4148 4872 cmd.exe PING.EXE PID 4872 wrote to memory of 4148 4872 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe"C:\Users\Admin\AppData\Local\Temp\4995fae854f60d188b634141ab918f93f01c85436b3ea21a116eaa83b67a4b35.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\360Downloads\Pester.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\PING.EXEping -n 4 127.0.0.13⤵
- Runs ping.exe
PID:4148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD56bcd66c85df1cfd53c6b963be18815b7
SHA1271beacb953ed8927a90b8969516f19b69fc13ef
SHA256ba5241246dbcd7a72dbe9387bde1ba8a6ba1585d0628fc0ad5d6e52210be55c2
SHA5123ddb76468cf04ca0587dabe7cb3e32067a46cfa05dc7c5b87e6e4d092ee2d84c959403bdc1241eecacd2d5173e07c3287a9044dcaf2cb395fc125f11482ec96b