Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
40064d0bd8269a114c1d9dc36fbe02d2.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
40064d0bd8269a114c1d9dc36fbe02d2.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
40064d0bd8269a114c1d9dc36fbe02d2.exe
-
Size
390KB
-
MD5
40064d0bd8269a114c1d9dc36fbe02d2
-
SHA1
6349e57b6f6d72a7aa9f8473b59d3556c8fb4bbc
-
SHA256
24ada62e0b150e679042dade964466501da86564be56911777a00df8fea6c331
-
SHA512
a0fd66c3f5dce3410ccf051a074ab1c77f276907de73adb136f1b6ee895518b4df039e5b95762a322b621aab96fabe61cbc2c47bcc9a32aa7f97bcb4dd54c452
-
SSDEEP
12288:BvW/x3Ge1sqRKW8xHHHHHHHHHHHHxMTHjJHHHHHHu+KHhPeHRbHVHHHHHHtHHHBi:hW/lGhqUW8xHHHHHHHHHHHHAHjJHHHHI
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4340 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4696 wrote to memory of 380 4696 40064d0bd8269a114c1d9dc36fbe02d2.exe 101 PID 4696 wrote to memory of 380 4696 40064d0bd8269a114c1d9dc36fbe02d2.exe 101 PID 4696 wrote to memory of 380 4696 40064d0bd8269a114c1d9dc36fbe02d2.exe 101 PID 380 wrote to memory of 4340 380 cmd.exe 99 PID 380 wrote to memory of 4340 380 cmd.exe 99 PID 380 wrote to memory of 4340 380 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\40064d0bd8269a114c1d9dc36fbe02d2.exe"C:\Users\Admin\AppData\Local\Temp\40064d0bd8269a114c1d9dc36fbe02d2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\40064d0bd8269a114c1d9dc36fbe02d2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:380
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:4340