Analysis
-
max time kernel
57s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 18:57
Static task
static1
Behavioral task
behavioral1
Sample
bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe
Resource
win10v2004-20220812-en
General
-
Target
bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe
-
Size
370KB
-
MD5
258044255eedf3cd76310e0b3ed33619
-
SHA1
57fcfad5e481842819e7e50fd345920bc8e2ceb0
-
SHA256
bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9
-
SHA512
65f35f5362ccd722c57b59e963478936573025433846169290a744620249ffeb0a4f7a8238210e68bf8a9baf838d49d59eb34c9c79b71e7ce80b3459e8af6785
-
SSDEEP
6144:T8WqoHN9mQRuA8eFpnMJhS6IjTp0tDPPUz05lMlsKONSBjje:FHjmQRXFGS68pI00DMlHVje
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1600 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 576 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 756 wrote to memory of 1600 756 bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe 31 PID 756 wrote to memory of 1600 756 bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe 31 PID 756 wrote to memory of 1600 756 bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe 31 PID 756 wrote to memory of 1600 756 bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe 31 PID 1600 wrote to memory of 576 1600 cmd.exe 33 PID 1600 wrote to memory of 576 1600 cmd.exe 33 PID 1600 wrote to memory of 576 1600 cmd.exe 33 PID 1600 wrote to memory of 576 1600 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe"C:\Users\Admin\AppData\Local\Temp\bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\bc048d5a20b9ee912540c8fe4335e850f9543accf0fea5bb329e6b08df443eb9.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:576
-
-