Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
1163a9b148f2b7617eb70d22e6fb9f28.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1163a9b148f2b7617eb70d22e6fb9f28.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1163a9b148f2b7617eb70d22e6fb9f28.exe
-
Size
385KB
-
MD5
1163a9b148f2b7617eb70d22e6fb9f28
-
SHA1
ec9b9efac1843a16de4ce46bb9047ae562c63808
-
SHA256
20ab011b6f589002812e6343e3deb1bc1826b421f9a99106f88c49e7ef85fcf2
-
SHA512
23e13eb9de41206e0e2b64c47110cf0843c9397fec45f6aa47df49dc3839d11600623143a4760f8b951358e3416119e70b3617b012f9e3c6935eafa617596f88
-
SSDEEP
6144:9EbqBnScjHOtvt9d3o+SyTuzSMUqmbZe2N1lpu3RCl532:EkSgIV9d4+ASMUH971Zt2
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1652 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2764 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1652 2680 1163a9b148f2b7617eb70d22e6fb9f28.exe 33 PID 2680 wrote to memory of 1652 2680 1163a9b148f2b7617eb70d22e6fb9f28.exe 33 PID 2680 wrote to memory of 1652 2680 1163a9b148f2b7617eb70d22e6fb9f28.exe 33 PID 2680 wrote to memory of 1652 2680 1163a9b148f2b7617eb70d22e6fb9f28.exe 33 PID 1652 wrote to memory of 2764 1652 cmd.exe 35 PID 1652 wrote to memory of 2764 1652 cmd.exe 35 PID 1652 wrote to memory of 2764 1652 cmd.exe 35 PID 1652 wrote to memory of 2764 1652 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1163a9b148f2b7617eb70d22e6fb9f28.exe"C:\Users\Admin\AppData\Local\Temp\1163a9b148f2b7617eb70d22e6fb9f28.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1163a9b148f2b7617eb70d22e6fb9f28.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2764
-
-