Analysis
-
max time kernel
26s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
2e45d096a4cff43c6b9a166ff28c5be2.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2e45d096a4cff43c6b9a166ff28c5be2.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2e45d096a4cff43c6b9a166ff28c5be2.exe
-
Size
389KB
-
MD5
2e45d096a4cff43c6b9a166ff28c5be2
-
SHA1
5514bae4511835a6e293cc6b439ada6ded189d2c
-
SHA256
2401bd2135c585f61e4b7feed815acaea979ff8cbf8ffe98bbf0cd75c03e5bea
-
SHA512
53f62a3db841b5245b84a86d348b234605ea47747a07a53c44e3a276eaddd770cccb7f7e71d6518466df510fbc73e56f93c61e37490db6b76084ccb1fbcb5d2f
-
SSDEEP
6144:YGRa7MMpN+Dm5Wa3th2AD1+NQJXAh/024cacz80dsOR:YG0oKN+q5WA2bAi82LaGHR
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2028 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2652 1936 2e45d096a4cff43c6b9a166ff28c5be2.exe 33 PID 1936 wrote to memory of 2652 1936 2e45d096a4cff43c6b9a166ff28c5be2.exe 33 PID 1936 wrote to memory of 2652 1936 2e45d096a4cff43c6b9a166ff28c5be2.exe 33 PID 1936 wrote to memory of 2652 1936 2e45d096a4cff43c6b9a166ff28c5be2.exe 33 PID 2652 wrote to memory of 2028 2652 cmd.exe 35 PID 2652 wrote to memory of 2028 2652 cmd.exe 35 PID 2652 wrote to memory of 2028 2652 cmd.exe 35 PID 2652 wrote to memory of 2028 2652 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e45d096a4cff43c6b9a166ff28c5be2.exe"C:\Users\Admin\AppData\Local\Temp\2e45d096a4cff43c6b9a166ff28c5be2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2e45d096a4cff43c6b9a166ff28c5be2.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2028
-
-