Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
0dd8961670a2da791afaa8f49bbf35a2.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0dd8961670a2da791afaa8f49bbf35a2.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0dd8961670a2da791afaa8f49bbf35a2.exe
-
Size
470KB
-
MD5
0dd8961670a2da791afaa8f49bbf35a2
-
SHA1
fc4525da60223367d9917892b9056a29a800cb94
-
SHA256
11e771b820e9c81dd126a9f40292b26cb4d9f1fe16681a90fe9e509daa716d46
-
SHA512
183ec8e3f076b845fc715ba5d23841dda72906a8ec209fb688033d02227555290172ebcdf8285ea16b93695934ef381dd319a3475ed7474fba482807ade223df
-
SSDEEP
6144:UkzfVFOOFu67Hnj4PE/c0xbce4aQIiS9F2UUQBZSrkntSixLicFlohOpyzwpQmn4:5l8aHjEixbcPaQIh3ZGknQixRkiucDE
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1460 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2280 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1460 2400 0dd8961670a2da791afaa8f49bbf35a2.exe 33 PID 2400 wrote to memory of 1460 2400 0dd8961670a2da791afaa8f49bbf35a2.exe 33 PID 2400 wrote to memory of 1460 2400 0dd8961670a2da791afaa8f49bbf35a2.exe 33 PID 2400 wrote to memory of 1460 2400 0dd8961670a2da791afaa8f49bbf35a2.exe 33 PID 1460 wrote to memory of 2280 1460 cmd.exe 35 PID 1460 wrote to memory of 2280 1460 cmd.exe 35 PID 1460 wrote to memory of 2280 1460 cmd.exe 35 PID 1460 wrote to memory of 2280 1460 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd8961670a2da791afaa8f49bbf35a2.exe"C:\Users\Admin\AppData\Local\Temp\0dd8961670a2da791afaa8f49bbf35a2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0dd8961670a2da791afaa8f49bbf35a2.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2280
-
-