Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 05:44

General

  • Target

    10484ece6159290280315df0071feab5.exe

  • Size

    465KB

  • MD5

    10484ece6159290280315df0071feab5

  • SHA1

    3f10fc3ff661b4dfe7424c516119e267ee867bbe

  • SHA256

    59edbe5b222c56a7b565bd3f65d32bbfaa2ebbeb8143ad542268ae1c805e61d1

  • SHA512

    9690f2102051f27fc2713d81037c53cafc77ef2c8a3a8053f2022cec1d52618229b57c16cee4bccf9e5e70360c780b9d38069249b00dcae523b17161f73cff0c

  • SSDEEP

    6144:/K0eY9v/66ESieaLK4DtDqPvJPss6hz107Xa9G3K3sK4bgam+xp6N8TP+:JXmX64DtEqrx07XcGisHm+BT+

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10484ece6159290280315df0071feab5.exe
    "C:\Users\Admin\AppData\Local\Temp\10484ece6159290280315df0071feab5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\10484ece6159290280315df0071feab5.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4552
  • C:\Windows\SysWOW64\PING.EXE
    ping 1.1.1.1 -n 1 -w 3000
    1⤵
    • Runs ping.exe
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4296-0-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/4296-1-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/4296-2-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/4296-3-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB