Analysis
-
max time kernel
137s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
6fcd4a91c3222c34b10768edaad6f560.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6fcd4a91c3222c34b10768edaad6f560.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
6fcd4a91c3222c34b10768edaad6f560.exe
-
Size
3.2MB
-
MD5
6fcd4a91c3222c34b10768edaad6f560
-
SHA1
e5a9732c25105d7102787a2dc1bdf55f366d4ec6
-
SHA256
12c26cb1ed570e0d5db1b59e04c388004663b03b8734d736c2691fb62a830571
-
SHA512
677e50400c1e100b5e9b2d05ea3d51444d8ee557e9d3ec6161ccc5c4c32f99648d793c5a356528b6b31ff2038f55a17ece2f7d46389a622e07dd472ea216b99e
-
SSDEEP
98304:bd1x+bLyuP4K84nQOywFhEejkH+FlS2Si5xenYSmZIVNuMF5B5iOi:d+bLvQK840wFPjk0lSaHGFmZYNuk5/iF
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4644 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1532 2960 6fcd4a91c3222c34b10768edaad6f560.exe 101 PID 2960 wrote to memory of 1532 2960 6fcd4a91c3222c34b10768edaad6f560.exe 101 PID 2960 wrote to memory of 1532 2960 6fcd4a91c3222c34b10768edaad6f560.exe 101 PID 1532 wrote to memory of 4644 1532 cmd.exe 97 PID 1532 wrote to memory of 4644 1532 cmd.exe 97 PID 1532 wrote to memory of 4644 1532 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fcd4a91c3222c34b10768edaad6f560.exe"C:\Users\Admin\AppData\Local\Temp\6fcd4a91c3222c34b10768edaad6f560.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6fcd4a91c3222c34b10768edaad6f560.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1532
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:4644