Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 05:34
Static task
static1
Behavioral task
behavioral1
Sample
085845f89057a0880d2bc4d717fef2a1.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
085845f89057a0880d2bc4d717fef2a1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
085845f89057a0880d2bc4d717fef2a1.exe
-
Size
458KB
-
MD5
085845f89057a0880d2bc4d717fef2a1
-
SHA1
386270ef68d7e6786cc4c5e2fc4466c8bcdf7fc2
-
SHA256
22645fb7985d0a1523ad22900306170f7f29181129c376974a5489c4a0871e59
-
SHA512
81f9084b51b5d53a23a13435d43abd746d824b046405f7d2f4915ac49109a98a0699a034eb77cb968a6cca23b14d47999aad09f0c64545c31ec78b64177b1a90
-
SSDEEP
6144:sJ6VANOasIMiWxBdMt3VcOmHiMGyWbeSXR7e80sYXQ:scObyByt3VEgFeZQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2564 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2668 1752 085845f89057a0880d2bc4d717fef2a1.exe 30 PID 1752 wrote to memory of 2668 1752 085845f89057a0880d2bc4d717fef2a1.exe 30 PID 1752 wrote to memory of 2668 1752 085845f89057a0880d2bc4d717fef2a1.exe 30 PID 1752 wrote to memory of 2668 1752 085845f89057a0880d2bc4d717fef2a1.exe 30 PID 2668 wrote to memory of 2564 2668 cmd.exe 32 PID 2668 wrote to memory of 2564 2668 cmd.exe 32 PID 2668 wrote to memory of 2564 2668 cmd.exe 32 PID 2668 wrote to memory of 2564 2668 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\085845f89057a0880d2bc4d717fef2a1.exe"C:\Users\Admin\AppData\Local\Temp\085845f89057a0880d2bc4d717fef2a1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\085845f89057a0880d2bc4d717fef2a1.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2564
-
-