Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
fa930413cad2bd6200401e1b5c9a1a54.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fa930413cad2bd6200401e1b5c9a1a54.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
fa930413cad2bd6200401e1b5c9a1a54.exe
-
Size
474KB
-
MD5
fa930413cad2bd6200401e1b5c9a1a54
-
SHA1
75c2c9924f5f2bb18774a87fd6f85cfa27e8bc2c
-
SHA256
11114e5c99d98334f29d81e782feb8f4fb0687aaf1097d3764b74d85910e8f4b
-
SHA512
efdac7a8b1fa2341fa791fb2bef1ded6e49bfd53da43b3d0ca1c42766b6419a4443a0193086b8848334cc3990f1f840ef577f349f22558c0c8b0257b0e4a61dc
-
SSDEEP
6144:kt0jLgrKeTMyk8REKgGp/NMaq+af2rQH9vqCJNqRl2ek3n+ZL:kKLgrzQPwE2aazaOk1qWY43WL
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3000 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2540 2188 fa930413cad2bd6200401e1b5c9a1a54.exe 31 PID 2188 wrote to memory of 2540 2188 fa930413cad2bd6200401e1b5c9a1a54.exe 31 PID 2188 wrote to memory of 2540 2188 fa930413cad2bd6200401e1b5c9a1a54.exe 31 PID 2188 wrote to memory of 2540 2188 fa930413cad2bd6200401e1b5c9a1a54.exe 31 PID 2540 wrote to memory of 3000 2540 cmd.exe 34 PID 2540 wrote to memory of 3000 2540 cmd.exe 34 PID 2540 wrote to memory of 3000 2540 cmd.exe 34 PID 2540 wrote to memory of 3000 2540 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa930413cad2bd6200401e1b5c9a1a54.exe"C:\Users\Admin\AppData\Local\Temp\fa930413cad2bd6200401e1b5c9a1a54.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fa930413cad2bd6200401e1b5c9a1a54.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:3000
-
-