Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
1ce52c9b450783e3c206ad527ca8f6de.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ce52c9b450783e3c206ad527ca8f6de.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
1ce52c9b450783e3c206ad527ca8f6de.exe
-
Size
374KB
-
MD5
1ce52c9b450783e3c206ad527ca8f6de
-
SHA1
85571b4e1ed8722ba1a08e82a2fa602962693f9b
-
SHA256
10c08cc558fdd3fe5532bb6ff3bd5afc0c639b846eab7685059ea82067681611
-
SHA512
462c61c40b795653b56dae778c8fb41592af73a51026ae03591e38e66736943f51c04ff7f2568be0baf14b06035527ae299156cb53b460f348382cf274ddb0a9
-
SSDEEP
6144:vUErZWeqBojpbzXs735nWnSvL3+QpoAO5bLU7ZP8bB9zxVxnCGX:XZ1PCbjzpoAKbo7ZEbzFCGX
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2796 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2668 2192 1ce52c9b450783e3c206ad527ca8f6de.exe 30 PID 2192 wrote to memory of 2668 2192 1ce52c9b450783e3c206ad527ca8f6de.exe 30 PID 2192 wrote to memory of 2668 2192 1ce52c9b450783e3c206ad527ca8f6de.exe 30 PID 2192 wrote to memory of 2668 2192 1ce52c9b450783e3c206ad527ca8f6de.exe 30 PID 2668 wrote to memory of 2796 2668 cmd.exe 32 PID 2668 wrote to memory of 2796 2668 cmd.exe 32 PID 2668 wrote to memory of 2796 2668 cmd.exe 32 PID 2668 wrote to memory of 2796 2668 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ce52c9b450783e3c206ad527ca8f6de.exe"C:\Users\Admin\AppData\Local\Temp\1ce52c9b450783e3c206ad527ca8f6de.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1ce52c9b450783e3c206ad527ca8f6de.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2796
-
-