Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
1672e3990f038c73d1c4126f30cbcf7a.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1672e3990f038c73d1c4126f30cbcf7a.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
1672e3990f038c73d1c4126f30cbcf7a.exe
-
Size
385KB
-
MD5
1672e3990f038c73d1c4126f30cbcf7a
-
SHA1
9a786aa266fd95d8bb4e3d649ae1454f3d77a0cf
-
SHA256
102383a2e13dd10b324af14e58c0d8b7a28fa92dde04c54f13d46c41f977599a
-
SHA512
d1be2cc9cabf9eda134fb6d483e5a1cd1018ab9f7e7a649d1e99009d7979b4afc4683da8782dcc4b1d984d7d7406b9607a3025f1ac747df2604892e570289e46
-
SSDEEP
6144:/OR5BsjMm8nMwVwk55wi6WRhCZPkX6dZ+1ipGEMi1Mcjt6Fut4+XxnCGb:WR5mjgVwkiWXCZkX6dZQD/Ek8CGb
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2296 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2660 2784 1672e3990f038c73d1c4126f30cbcf7a.exe 31 PID 2784 wrote to memory of 2660 2784 1672e3990f038c73d1c4126f30cbcf7a.exe 31 PID 2784 wrote to memory of 2660 2784 1672e3990f038c73d1c4126f30cbcf7a.exe 31 PID 2784 wrote to memory of 2660 2784 1672e3990f038c73d1c4126f30cbcf7a.exe 31 PID 2660 wrote to memory of 2296 2660 cmd.exe 33 PID 2660 wrote to memory of 2296 2660 cmd.exe 33 PID 2660 wrote to memory of 2296 2660 cmd.exe 33 PID 2660 wrote to memory of 2296 2660 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1672e3990f038c73d1c4126f30cbcf7a.exe"C:\Users\Admin\AppData\Local\Temp\1672e3990f038c73d1c4126f30cbcf7a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1672e3990f038c73d1c4126f30cbcf7a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2296
-
-