Analysis
-
max time kernel
140s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
36b68961ef420d1b1cf70dc774e34e93.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
36b68961ef420d1b1cf70dc774e34e93.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
36b68961ef420d1b1cf70dc774e34e93.exe
-
Size
397KB
-
MD5
36b68961ef420d1b1cf70dc774e34e93
-
SHA1
8686f9f7250f6ec382f28e3fcaf0c1030402f051
-
SHA256
22d0326045e0d39ac693cbf66555fb5fb8bfe46c939be259f46c457d22d80c82
-
SHA512
4efa75a1a5e9a6f07e080d91409b7841e55bea30c5de12b86fdf672d0201aecfcf77020ab973d245e72b0b1d9d39daabb70175ae720674154b5f5a853d228673
-
SSDEEP
6144:ETjR5PrKF1qNFed5Sp8uq6zout2+/gG0QRXDxHG7fndoO/:EvRhCSp8uJouw+E8XDxm7fh/
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1484 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1128 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1484 1724 36b68961ef420d1b1cf70dc774e34e93.exe 32 PID 1724 wrote to memory of 1484 1724 36b68961ef420d1b1cf70dc774e34e93.exe 32 PID 1724 wrote to memory of 1484 1724 36b68961ef420d1b1cf70dc774e34e93.exe 32 PID 1724 wrote to memory of 1484 1724 36b68961ef420d1b1cf70dc774e34e93.exe 32 PID 1484 wrote to memory of 1128 1484 cmd.exe 34 PID 1484 wrote to memory of 1128 1484 cmd.exe 34 PID 1484 wrote to memory of 1128 1484 cmd.exe 34 PID 1484 wrote to memory of 1128 1484 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\36b68961ef420d1b1cf70dc774e34e93.exe"C:\Users\Admin\AppData\Local\Temp\36b68961ef420d1b1cf70dc774e34e93.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\36b68961ef420d1b1cf70dc774e34e93.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1128
-
-