Analysis
-
max time kernel
103s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe
Resource
win10v2004-20220812-en
General
-
Target
f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe
-
Size
67KB
-
MD5
10c23ec0de54a3ad228e25d5c97ad510
-
SHA1
62d8701d9fdf6d65a9b4575b4e90ee68261f59b0
-
SHA256
f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28
-
SHA512
96654199549eb5d7d7d44c1841759cfe7593ea55e207d5cce8bcbaba00ef2527ca63db08ea7cdf477b755500041c5a7662f0977f796a3a84eecf761af2b95402
-
SSDEEP
768:+Nt3A3M/z/z5yvGyfUG5f02p/7DNtoL5ehRNS1oFKBM4kRu+AeDIdFZj9TjFCQQ9:g3AczqZPNtodXmBQjTJCNigP0jDt4EBk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1520 cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1712 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1292 f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe 1292 f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1520 1292 f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe 31 PID 1292 wrote to memory of 1520 1292 f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe 31 PID 1292 wrote to memory of 1520 1292 f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe 31 PID 1292 wrote to memory of 1520 1292 f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe 31 PID 1520 wrote to memory of 1712 1520 cmd.exe 33 PID 1520 wrote to memory of 1712 1520 cmd.exe 33 PID 1520 wrote to memory of 1712 1520 cmd.exe 33 PID 1520 wrote to memory of 1712 1520 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe"C:\Users\Admin\AppData\Local\Temp\f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\f4ccfab4ba94e40240e469262e7c561876d2cd025ae89decb4171eddcccafa28.exe" >> nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.13⤵
- Runs ping.exe
PID:1712
-
-