Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 09:54
Behavioral task
behavioral1
Sample
6545d99d9fc0b631695910bc7a1d74d1.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6545d99d9fc0b631695910bc7a1d74d1.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
6545d99d9fc0b631695910bc7a1d74d1.exe
-
Size
466KB
-
MD5
6545d99d9fc0b631695910bc7a1d74d1
-
SHA1
683dd93da79d9a212fd41a930be7278e8d9dd8ea
-
SHA256
13a1f2c9d55e100d01a8443a74fad2768b28e3228e691e68cc49c132c179f4f8
-
SHA512
c15bf8f357637cb4259ab02013739d741acf92c6f6e360e86199e7e36ffbb8f02fab37d53235c59ab23dbaef9f1c307dd761ea86405111ed6d25c246ac9aec6b
-
SSDEEP
6144:8nkgq6ik5BaljNRu0MNm8c8hhaW7Ql5vzRVIxBo4Fnd+ToW0Cxivfwy2R2fnv:8nkBkHaljNg5vjhq5vHYBJ+t0Cxawybv
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1524 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2916 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1524 2676 6545d99d9fc0b631695910bc7a1d74d1.exe 32 PID 2676 wrote to memory of 1524 2676 6545d99d9fc0b631695910bc7a1d74d1.exe 32 PID 2676 wrote to memory of 1524 2676 6545d99d9fc0b631695910bc7a1d74d1.exe 32 PID 2676 wrote to memory of 1524 2676 6545d99d9fc0b631695910bc7a1d74d1.exe 32 PID 1524 wrote to memory of 2916 1524 cmd.exe 33 PID 1524 wrote to memory of 2916 1524 cmd.exe 33 PID 1524 wrote to memory of 2916 1524 cmd.exe 33 PID 1524 wrote to memory of 2916 1524 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6545d99d9fc0b631695910bc7a1d74d1.exe"C:\Users\Admin\AppData\Local\Temp\6545d99d9fc0b631695910bc7a1d74d1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6545d99d9fc0b631695910bc7a1d74d1.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2916
-
-