Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:38
Static task
static1
Behavioral task
behavioral1
Sample
116840b72d6d80c9156db03e8aaef1c4.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
116840b72d6d80c9156db03e8aaef1c4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
116840b72d6d80c9156db03e8aaef1c4.exe
-
Size
461KB
-
MD5
116840b72d6d80c9156db03e8aaef1c4
-
SHA1
e3d950170d9db1930752f1290ec3669cbd3a0e3d
-
SHA256
0929fe9f8d1af542cca64acca1d6c3300208d6eca07eddcdf7063ec21d879ec2
-
SHA512
f9ed590c553363214e5e807b52d267775f4a012b680dc73065b25a06542a92b0ad12a2baf3c92e5d04bbc877dba702d42f4c1c17c6f49c0b2b84ffc6c41802dd
-
SSDEEP
6144:wj6btw8MwQImvy9wavha1Z6n1eOJxyDqeb233XBhK/7QUHlXm96cmWHbJcS2qPbl:wjIw8MwQIMawagTp7H+3K/7THTsbKXu
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2808 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2800 1904 116840b72d6d80c9156db03e8aaef1c4.exe 30 PID 1904 wrote to memory of 2800 1904 116840b72d6d80c9156db03e8aaef1c4.exe 30 PID 1904 wrote to memory of 2800 1904 116840b72d6d80c9156db03e8aaef1c4.exe 30 PID 1904 wrote to memory of 2800 1904 116840b72d6d80c9156db03e8aaef1c4.exe 30 PID 2800 wrote to memory of 2808 2800 cmd.exe 32 PID 2800 wrote to memory of 2808 2800 cmd.exe 32 PID 2800 wrote to memory of 2808 2800 cmd.exe 32 PID 2800 wrote to memory of 2808 2800 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\116840b72d6d80c9156db03e8aaef1c4.exe"C:\Users\Admin\AppData\Local\Temp\116840b72d6d80c9156db03e8aaef1c4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\116840b72d6d80c9156db03e8aaef1c4.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2808
-
-