Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 23:18
Static task
static1
Behavioral task
behavioral1
Sample
7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe
Resource
win10v2004-20221111-en
General
-
Target
7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe
-
Size
972KB
-
MD5
7e6204584c0ae455836d2d9733a32b70
-
SHA1
3bc0e6cd46ecba671b305c293eb4874cc392844b
-
SHA256
7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3
-
SHA512
ffd13b1ab3ffa691db025d21a28cc5b6a0ad707262bee93244a00ea4760938cb489a93defe7b0507ca04fa2ca45b5df01f85c91e8cc4563e4ff1d8594f89d82c
-
SSDEEP
12288:npZ7RqTHG1GtRmjWjRlgivK2YyUxUi2MOOpnjuNIOHeOPYxYIswU6fsDukauZHc6:f7YTmhUlV4xUlOJjuN5HeU+hXJetGj
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1688 cmd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exedescription ioc process File opened for modification \??\PhysicalDrive0 7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.execmd.exedescription pid process target process PID 1812 wrote to memory of 1688 1812 7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe cmd.exe PID 1812 wrote to memory of 1688 1812 7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe cmd.exe PID 1812 wrote to memory of 1688 1812 7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe cmd.exe PID 1812 wrote to memory of 1688 1812 7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe cmd.exe PID 1688 wrote to memory of 776 1688 cmd.exe PING.EXE PID 1688 wrote to memory of 776 1688 cmd.exe PING.EXE PID 1688 wrote to memory of 776 1688 cmd.exe PING.EXE PID 1688 wrote to memory of 776 1688 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe"C:\Users\Admin\AppData\Local\Temp\7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7cf276d9e1296de849166878c2af0ffcad34d555f126533a06be4522357d05c3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:776