Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 03:20
Static task
static1
Behavioral task
behavioral1
Sample
4fc7d0d3822b50eab68a9885c0e7af6e.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4fc7d0d3822b50eab68a9885c0e7af6e.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4fc7d0d3822b50eab68a9885c0e7af6e.exe
-
Size
450KB
-
MD5
4fc7d0d3822b50eab68a9885c0e7af6e
-
SHA1
83da3d258ab0ac0b7ffc33148a4d4668e2d7d4a7
-
SHA256
05ef1332924211886cf244a03cd77674906f3872e8526c47d488c84d0f2e541f
-
SHA512
7da0af5af053827aef37f314d545e7e165a9b53048032dd3bbb1c791a54b46f89aa0aeef646b559187a7e94e6c347b9c9b44b2c446739d5f383d024cfd776acd
-
SSDEEP
12288:Mnnnnnnnnnnnnn0oCLnnn4nnnn3nnnnnnnnnnnnnnnM9X+nriMi6zVZLatkOvRJu:FJMi6zCvjTcUt0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2704 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2252 2908 4fc7d0d3822b50eab68a9885c0e7af6e.exe 33 PID 2908 wrote to memory of 2252 2908 4fc7d0d3822b50eab68a9885c0e7af6e.exe 33 PID 2908 wrote to memory of 2252 2908 4fc7d0d3822b50eab68a9885c0e7af6e.exe 33 PID 2908 wrote to memory of 2252 2908 4fc7d0d3822b50eab68a9885c0e7af6e.exe 33 PID 2252 wrote to memory of 2704 2252 cmd.exe 31 PID 2252 wrote to memory of 2704 2252 cmd.exe 31 PID 2252 wrote to memory of 2704 2252 cmd.exe 31 PID 2252 wrote to memory of 2704 2252 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fc7d0d3822b50eab68a9885c0e7af6e.exe"C:\Users\Admin\AppData\Local\Temp\4fc7d0d3822b50eab68a9885c0e7af6e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4fc7d0d3822b50eab68a9885c0e7af6e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2252
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:2704