Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
46af24af1722e93e004b382a4f514198.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
46af24af1722e93e004b382a4f514198.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
46af24af1722e93e004b382a4f514198.exe
-
Size
470KB
-
MD5
46af24af1722e93e004b382a4f514198
-
SHA1
ee5aa0c87be2e6f963b8938bc435cc71a0c9c0d2
-
SHA256
062b07dcdd2a03dba2eb84019f881d62d61a48b094a7a01764f8d7ab33b0989d
-
SHA512
fc03264225dd2c5049ae5a4c5a21d09aee28004c900316fca2653810d6be3bb4011202a183a92bb80c7d9fe16d130c9118ad0282e052f587cca265502c0d26f9
-
SSDEEP
6144:uCMmrKJ1uRdEcZ/vkiR8hozHiFNzsPNvCVieCtqkOSnd509p1q57F9Vnv:ul7cZ/vFRfew9amnO4D09pi7Ffv
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2788 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2816 2148 46af24af1722e93e004b382a4f514198.exe 30 PID 2148 wrote to memory of 2816 2148 46af24af1722e93e004b382a4f514198.exe 30 PID 2148 wrote to memory of 2816 2148 46af24af1722e93e004b382a4f514198.exe 30 PID 2148 wrote to memory of 2816 2148 46af24af1722e93e004b382a4f514198.exe 30 PID 2816 wrote to memory of 2788 2816 cmd.exe 32 PID 2816 wrote to memory of 2788 2816 cmd.exe 32 PID 2816 wrote to memory of 2788 2816 cmd.exe 32 PID 2816 wrote to memory of 2788 2816 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\46af24af1722e93e004b382a4f514198.exe"C:\Users\Admin\AppData\Local\Temp\46af24af1722e93e004b382a4f514198.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\46af24af1722e93e004b382a4f514198.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2788
-
-