Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:44
Static task
static1
Behavioral task
behavioral1
Sample
038369d72e95b5f4cbe7a8f6601d041c.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
038369d72e95b5f4cbe7a8f6601d041c.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
038369d72e95b5f4cbe7a8f6601d041c.exe
-
Size
374KB
-
MD5
038369d72e95b5f4cbe7a8f6601d041c
-
SHA1
10e8ba078c3776ce893d7e9cf2652221397fc9f7
-
SHA256
5ccdc6f4ae540fc24daa406571faa0748627eb608910c825434c49e283ab0ffd
-
SHA512
0dfdcc1f07b90a42e2a94ec9170f673bf9579563d85390480d6a5b0c10efd516e3f9bf93438af912cd6ef6c685262d6371d54c4fd45aea7d6c4574d36107407d
-
SSDEEP
6144:0azxDXDxEA4wqbtUxvJdvwDkf8A0QgEnH+9YnXx4TkZNpgL064UPxK9:0ixEALqbtU/d44CEe9yXuTkZS0Z9
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2228 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2696 3048 038369d72e95b5f4cbe7a8f6601d041c.exe 30 PID 3048 wrote to memory of 2696 3048 038369d72e95b5f4cbe7a8f6601d041c.exe 30 PID 3048 wrote to memory of 2696 3048 038369d72e95b5f4cbe7a8f6601d041c.exe 30 PID 3048 wrote to memory of 2696 3048 038369d72e95b5f4cbe7a8f6601d041c.exe 30 PID 2696 wrote to memory of 2228 2696 cmd.exe 32 PID 2696 wrote to memory of 2228 2696 cmd.exe 32 PID 2696 wrote to memory of 2228 2696 cmd.exe 32 PID 2696 wrote to memory of 2228 2696 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\038369d72e95b5f4cbe7a8f6601d041c.exe"C:\Users\Admin\AppData\Local\Temp\038369d72e95b5f4cbe7a8f6601d041c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\038369d72e95b5f4cbe7a8f6601d041c.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2228
-
-