Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
36f26854d22b6278b0c08173cda67eff.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
36f26854d22b6278b0c08173cda67eff.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
36f26854d22b6278b0c08173cda67eff.exe
-
Size
385KB
-
MD5
36f26854d22b6278b0c08173cda67eff
-
SHA1
53f2f63af78183069647fa233a4719de033e1a51
-
SHA256
2398195b6bb7675643f8239f7ad31bac5b031cf48148762df54923f3295ce6a9
-
SHA512
6fc8bc91355cbf0ef2d305b2a55e16427d3b184354b9b1c9f747846956b2b8c5fe066b1ae8f5bbad48b4482de2387d6c03f6b5c63c7578a005571f73da623d8b
-
SSDEEP
6144:aYU7CGagzZydyiMJI+/JH1+bFRBuv/rwQ4x5RHr0JpBM4wOhn8td2pGA:sPagzMgiAIuJ0bFDyjw2a4wKbUA
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2808 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2800 2296 36f26854d22b6278b0c08173cda67eff.exe 30 PID 2296 wrote to memory of 2800 2296 36f26854d22b6278b0c08173cda67eff.exe 30 PID 2296 wrote to memory of 2800 2296 36f26854d22b6278b0c08173cda67eff.exe 30 PID 2296 wrote to memory of 2800 2296 36f26854d22b6278b0c08173cda67eff.exe 30 PID 2800 wrote to memory of 2808 2800 cmd.exe 32 PID 2800 wrote to memory of 2808 2800 cmd.exe 32 PID 2800 wrote to memory of 2808 2800 cmd.exe 32 PID 2800 wrote to memory of 2808 2800 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f26854d22b6278b0c08173cda67eff.exe"C:\Users\Admin\AppData\Local\Temp\36f26854d22b6278b0c08173cda67eff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\36f26854d22b6278b0c08173cda67eff.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2808
-
-