Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
12d9ef92b9153a50c55185ef01dbb0aa.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
12d9ef92b9153a50c55185ef01dbb0aa.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
12d9ef92b9153a50c55185ef01dbb0aa.exe
-
Size
458KB
-
MD5
12d9ef92b9153a50c55185ef01dbb0aa
-
SHA1
2e0df5c32cbf313d7cf1100f9a04ea21508f6d6c
-
SHA256
049213763941f620f0ccd79bcdb4273c661e0981835d672f98ba582aa38bdf00
-
SHA512
5836e2d76e99dd8b3e7a55e5ec69b84cb3e8229ecf03ec200792ba52ae5171acfc4d1ee72fe01f6b96d81760cafbffe1723e0331e1d870f871842de8751b1f20
-
SSDEEP
6144:EWIA+28ZPhY5dE+wRmoZofiv8xdhHvOd1vdEe5QV+q/J6IAZhMVYFWETDwmPr/:EWIAx8ZYuV2fvdhHWme2Vt6rhjWE9Pr/
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2600 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2904 4716 12d9ef92b9153a50c55185ef01dbb0aa.exe 91 PID 4716 wrote to memory of 2904 4716 12d9ef92b9153a50c55185ef01dbb0aa.exe 91 PID 4716 wrote to memory of 2904 4716 12d9ef92b9153a50c55185ef01dbb0aa.exe 91 PID 2904 wrote to memory of 2600 2904 cmd.exe 93 PID 2904 wrote to memory of 2600 2904 cmd.exe 93 PID 2904 wrote to memory of 2600 2904 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d9ef92b9153a50c55185ef01dbb0aa.exe"C:\Users\Admin\AppData\Local\Temp\12d9ef92b9153a50c55185ef01dbb0aa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\12d9ef92b9153a50c55185ef01dbb0aa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2600
-
-