Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
0f188b04ed896f8445e1382431fbaaef.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f188b04ed896f8445e1382431fbaaef.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0f188b04ed896f8445e1382431fbaaef.exe
-
Size
474KB
-
MD5
0f188b04ed896f8445e1382431fbaaef
-
SHA1
bfb0d036a4f5192b4ee7db3c25322245039cee1a
-
SHA256
053992f54478ea317baacc344e8b5237f4680ea98df09f2300e4264bb5e12299
-
SHA512
94af91280f6d62c27379efa52f55db6df4dcb8402bad41f3a1d0f4b60309cbb27d4560a62e42965a912863651e14fddcc0c7d07f2f24fc81f7df69987a311e95
-
SSDEEP
6144:0t0jLgrKeTMyk8REKgGp/NMaq+af2rQH9vqCJNqRl2ek9n+Zs:0KLgrzQPwE2aazaOk1qWY4BWs
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4212 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1148 1192 0f188b04ed896f8445e1382431fbaaef.exe 98 PID 1192 wrote to memory of 1148 1192 0f188b04ed896f8445e1382431fbaaef.exe 98 PID 1192 wrote to memory of 1148 1192 0f188b04ed896f8445e1382431fbaaef.exe 98 PID 1148 wrote to memory of 4212 1148 cmd.exe 100 PID 1148 wrote to memory of 4212 1148 cmd.exe 100 PID 1148 wrote to memory of 4212 1148 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f188b04ed896f8445e1382431fbaaef.exe"C:\Users\Admin\AppData\Local\Temp\0f188b04ed896f8445e1382431fbaaef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0f188b04ed896f8445e1382431fbaaef.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:4212
-
-