Analysis
-
max time kernel
166s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 02:48
Static task
static1
Behavioral task
behavioral1
Sample
00eb46c192a8d196dca5efb350237ac2.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
00eb46c192a8d196dca5efb350237ac2.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
00eb46c192a8d196dca5efb350237ac2.exe
-
Size
457KB
-
MD5
00eb46c192a8d196dca5efb350237ac2
-
SHA1
026c2994aca77e5c9f9d117434dc3d5f31e01fc3
-
SHA256
229b6e78ad26cc62c1e5f51500579c9c3f26eaeefab2f7d476f8edced694943d
-
SHA512
6e18573d9ef082b6a2839e88b789dd020b344d51d527c3d010f63c06f20d92532bbaf78545bc89335a30c94b5bbd18eed174628c35051ed85385c1e953ecaf86
-
SSDEEP
12288:bISeSjcA3z0+eW6Cxfhgs4BiWHXgq9agr:1Dl0yxmliWgUagr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1200 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2344 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1200 1840 00eb46c192a8d196dca5efb350237ac2.exe 30 PID 1840 wrote to memory of 1200 1840 00eb46c192a8d196dca5efb350237ac2.exe 30 PID 1840 wrote to memory of 1200 1840 00eb46c192a8d196dca5efb350237ac2.exe 30 PID 1840 wrote to memory of 1200 1840 00eb46c192a8d196dca5efb350237ac2.exe 30 PID 1200 wrote to memory of 2344 1200 cmd.exe 32 PID 1200 wrote to memory of 2344 1200 cmd.exe 32 PID 1200 wrote to memory of 2344 1200 cmd.exe 32 PID 1200 wrote to memory of 2344 1200 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\00eb46c192a8d196dca5efb350237ac2.exe"C:\Users\Admin\AppData\Local\Temp\00eb46c192a8d196dca5efb350237ac2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\00eb46c192a8d196dca5efb350237ac2.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2344
-
-