Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 12:58

General

  • Target

    204ae4b9ca236e207059b359be84a1c3.exe

  • Size

    370KB

  • MD5

    204ae4b9ca236e207059b359be84a1c3

  • SHA1

    69a3cbdf7d91cc92067517063062a2bd96d4b314

  • SHA256

    0cfbff9d0e715fe8d43cf940adf9fd657479fb92e178d5e4b69cb07f3ccd87b6

  • SHA512

    8b6beea7d69e0dd4b1659a2ab70c2fa7ad730b00a38369af8f41dbf7566e239ea074dbcc65e143ee6543fb8e7048fde498f1c5d25b820e148c4ca6a2cddab0c9

  • SSDEEP

    6144:7eXIdc15KLtbnYK+xeC5i7/b/jlbIjejNgKgy4lAfvl:SYx9Yh2DKje5xgy4lAfvl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\204ae4b9ca236e207059b359be84a1c3.exe
    "C:\Users\Admin\AppData\Local\Temp\204ae4b9ca236e207059b359be84a1c3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\204ae4b9ca236e207059b359be84a1c3.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • Runs ping.exe
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-1-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1660-0-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1660-2-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1660-3-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB