Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1d820fdfb5891b200716e85c0ee37579.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d820fdfb5891b200716e85c0ee37579.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
1d820fdfb5891b200716e85c0ee37579.exe
-
Size
97KB
-
MD5
1d820fdfb5891b200716e85c0ee37579
-
SHA1
0056bf28b25ce78735ce42ab1c3cf58e3937d0b2
-
SHA256
79d7e85085a322fdbf037e1c5410c4a0a1bd0fb509484c0ce94fe9418f1dcd63
-
SHA512
2551dcbaafad7d490d73c2c42b46125a1360b9487db8904d1caf080b5951bb84e7787a5e6013ce5406b4300c1add538b2f53a20c61df1f30f447d5dede07cdf4
-
SSDEEP
1536:HpvbOcr+IBn/YA2Ee4KxmpdDySdrVBC/z4toaf1000:Hhr+IBnXHEx0yGk/zcf1n0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2280 cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main 1d820fdfb5891b200716e85c0ee37579.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2592 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 1d820fdfb5891b200716e85c0ee37579.exe 2976 1d820fdfb5891b200716e85c0ee37579.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2280 2976 1d820fdfb5891b200716e85c0ee37579.exe 30 PID 2976 wrote to memory of 2280 2976 1d820fdfb5891b200716e85c0ee37579.exe 30 PID 2976 wrote to memory of 2280 2976 1d820fdfb5891b200716e85c0ee37579.exe 30 PID 2976 wrote to memory of 2280 2976 1d820fdfb5891b200716e85c0ee37579.exe 30 PID 2280 wrote to memory of 2592 2280 cmd.exe 32 PID 2280 wrote to memory of 2592 2280 cmd.exe 32 PID 2280 wrote to memory of 2592 2280 cmd.exe 32 PID 2280 wrote to memory of 2592 2280 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d820fdfb5891b200716e85c0ee37579.exe"C:\Users\Admin\AppData\Local\Temp\1d820fdfb5891b200716e85c0ee37579.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\1d820fdfb5891b200716e85c0ee37579.exe" >> nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.13⤵
- Runs ping.exe
PID:2592
-
-