Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
14ce8163688f03b06654b88438b3fd15.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
14ce8163688f03b06654b88438b3fd15.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
14ce8163688f03b06654b88438b3fd15.exe
-
Size
322KB
-
MD5
14ce8163688f03b06654b88438b3fd15
-
SHA1
d5794c208361373b5b85ce23a3761d97016af524
-
SHA256
d503716b71f857de786e6e33f57dba3da6bcbccc4d7c7f0a202b119f88c85048
-
SHA512
cc59e3ff1dfdba00d4db70ec7869e160f88d69fcd060038d82526d5de31c3669981c40ba74e5c12d44da2b3eaf5d57ce6371ec7397f9ea2b1d877a16bb5ff7fd
-
SSDEEP
6144:Wfjh65Bhq2gfaGlc6/HA/ItZMdFmKZAIUj3M6q:QY5BhvGj8eMd8KXMq
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2880 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2624 2988 14ce8163688f03b06654b88438b3fd15.exe 31 PID 2988 wrote to memory of 2624 2988 14ce8163688f03b06654b88438b3fd15.exe 31 PID 2988 wrote to memory of 2624 2988 14ce8163688f03b06654b88438b3fd15.exe 31 PID 2988 wrote to memory of 2624 2988 14ce8163688f03b06654b88438b3fd15.exe 31 PID 2624 wrote to memory of 2880 2624 cmd.exe 33 PID 2624 wrote to memory of 2880 2624 cmd.exe 33 PID 2624 wrote to memory of 2880 2624 cmd.exe 33 PID 2624 wrote to memory of 2880 2624 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\14ce8163688f03b06654b88438b3fd15.exe"C:\Users\Admin\AppData\Local\Temp\14ce8163688f03b06654b88438b3fd15.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\14ce8163688f03b06654b88438b3fd15.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2880
-
-