Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
1672e3990f038c73d1c4126f30cbcf7a.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1672e3990f038c73d1c4126f30cbcf7a.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1672e3990f038c73d1c4126f30cbcf7a.exe
-
Size
385KB
-
MD5
1672e3990f038c73d1c4126f30cbcf7a
-
SHA1
9a786aa266fd95d8bb4e3d649ae1454f3d77a0cf
-
SHA256
102383a2e13dd10b324af14e58c0d8b7a28fa92dde04c54f13d46c41f977599a
-
SHA512
d1be2cc9cabf9eda134fb6d483e5a1cd1018ab9f7e7a649d1e99009d7979b4afc4683da8782dcc4b1d984d7d7406b9607a3025f1ac747df2604892e570289e46
-
SSDEEP
6144:/OR5BsjMm8nMwVwk55wi6WRhCZPkX6dZ+1ipGEMi1Mcjt6Fut4+XxnCGb:WR5mjgVwkiWXCZkX6dZQD/Ek8CGb
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2588 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2652 2232 1672e3990f038c73d1c4126f30cbcf7a.exe 30 PID 2232 wrote to memory of 2652 2232 1672e3990f038c73d1c4126f30cbcf7a.exe 30 PID 2232 wrote to memory of 2652 2232 1672e3990f038c73d1c4126f30cbcf7a.exe 30 PID 2232 wrote to memory of 2652 2232 1672e3990f038c73d1c4126f30cbcf7a.exe 30 PID 2652 wrote to memory of 2588 2652 cmd.exe 31 PID 2652 wrote to memory of 2588 2652 cmd.exe 31 PID 2652 wrote to memory of 2588 2652 cmd.exe 31 PID 2652 wrote to memory of 2588 2652 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1672e3990f038c73d1c4126f30cbcf7a.exe"C:\Users\Admin\AppData\Local\Temp\1672e3990f038c73d1c4126f30cbcf7a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1672e3990f038c73d1c4126f30cbcf7a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2588
-
-