Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
7f6836856bdba9ce4259adcaeccb763c.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f6836856bdba9ce4259adcaeccb763c.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7f6836856bdba9ce4259adcaeccb763c.exe
-
Size
457KB
-
MD5
7f6836856bdba9ce4259adcaeccb763c
-
SHA1
d4df83e3b2c9a0c715678a3b5d7e6501fbc09da0
-
SHA256
134068ec62940207627a513d9b70f34dd364139c032402abdaeccaedd34f35f1
-
SHA512
62b4dbb0af48756331c5c7c75e7899ab9588682b320d69ffbd6d709911a81fad15150a55c2bd572c66cf5661c4c98f0eddb3cae6c91995ad1997cc6de7d7051e
-
SSDEEP
12288:+P0T3EL8FDuM6Zjp85flX3X3X3X3X3Xt+cIwwid3e1If+ZKUSdyC:+Pm3EL2sjp8nX3X3X3X3X3Xt+cIyUWfb
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2520 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2652 2244 7f6836856bdba9ce4259adcaeccb763c.exe 33 PID 2244 wrote to memory of 2652 2244 7f6836856bdba9ce4259adcaeccb763c.exe 33 PID 2244 wrote to memory of 2652 2244 7f6836856bdba9ce4259adcaeccb763c.exe 33 PID 2244 wrote to memory of 2652 2244 7f6836856bdba9ce4259adcaeccb763c.exe 33 PID 2652 wrote to memory of 2520 2652 cmd.exe 31 PID 2652 wrote to memory of 2520 2652 cmd.exe 31 PID 2652 wrote to memory of 2520 2652 cmd.exe 31 PID 2652 wrote to memory of 2520 2652 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f6836856bdba9ce4259adcaeccb763c.exe"C:\Users\Admin\AppData\Local\Temp\7f6836856bdba9ce4259adcaeccb763c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7f6836856bdba9ce4259adcaeccb763c.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2652
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:2520