Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:58
Static task
static1
Behavioral task
behavioral1
Sample
204ae4b9ca236e207059b359be84a1c3.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
204ae4b9ca236e207059b359be84a1c3.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
204ae4b9ca236e207059b359be84a1c3.exe
-
Size
370KB
-
MD5
204ae4b9ca236e207059b359be84a1c3
-
SHA1
69a3cbdf7d91cc92067517063062a2bd96d4b314
-
SHA256
0cfbff9d0e715fe8d43cf940adf9fd657479fb92e178d5e4b69cb07f3ccd87b6
-
SHA512
8b6beea7d69e0dd4b1659a2ab70c2fa7ad730b00a38369af8f41dbf7566e239ea074dbcc65e143ee6543fb8e7048fde498f1c5d25b820e148c4ca6a2cddab0c9
-
SSDEEP
6144:7eXIdc15KLtbnYK+xeC5i7/b/jlbIjejNgKgy4lAfvl:SYx9Yh2DKje5xgy4lAfvl
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1824 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2804 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1824 1660 204ae4b9ca236e207059b359be84a1c3.exe 30 PID 1660 wrote to memory of 1824 1660 204ae4b9ca236e207059b359be84a1c3.exe 30 PID 1660 wrote to memory of 1824 1660 204ae4b9ca236e207059b359be84a1c3.exe 30 PID 1660 wrote to memory of 1824 1660 204ae4b9ca236e207059b359be84a1c3.exe 30 PID 1824 wrote to memory of 2804 1824 cmd.exe 31 PID 1824 wrote to memory of 2804 1824 cmd.exe 31 PID 1824 wrote to memory of 2804 1824 cmd.exe 31 PID 1824 wrote to memory of 2804 1824 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\204ae4b9ca236e207059b359be84a1c3.exe"C:\Users\Admin\AppData\Local\Temp\204ae4b9ca236e207059b359be84a1c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\204ae4b9ca236e207059b359be84a1c3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2804
-
-