Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 11:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bb1e254c8d1eb6e35a62fd68846cae62.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
bb1e254c8d1eb6e35a62fd68846cae62.exe
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
bb1e254c8d1eb6e35a62fd68846cae62.exe
-
Size
140KB
-
MD5
bb1e254c8d1eb6e35a62fd68846cae62
-
SHA1
b44797fdb95c8de9bf74aab0497b84138a3cef91
-
SHA256
601940057480e98ea00619b2f07a10185eba832eb0e377074f72bc2dc67e013e
-
SHA512
6ad2c9672f3ebacc6dd1cd0ed29187fbaf4d0e24f3412309c81292fcbbda5ad8eee3ca1efa5858be8fedead2df1f2fb3ed17167833db3a6332bbed391a8e02d4
-
SSDEEP
3072:pno8IogHjl+LV33yKfnod/37yfEr+uP7pc1GCHboWaum1CyqY8Xb8Y+o/:pno8IogHxg2f+Y7qIuu1Yn
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main bb1e254c8d1eb6e35a62fd68846cae62.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2540 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2244 bb1e254c8d1eb6e35a62fd68846cae62.exe 2244 bb1e254c8d1eb6e35a62fd68846cae62.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2692 2244 bb1e254c8d1eb6e35a62fd68846cae62.exe 30 PID 2244 wrote to memory of 2692 2244 bb1e254c8d1eb6e35a62fd68846cae62.exe 30 PID 2244 wrote to memory of 2692 2244 bb1e254c8d1eb6e35a62fd68846cae62.exe 30 PID 2244 wrote to memory of 2692 2244 bb1e254c8d1eb6e35a62fd68846cae62.exe 30 PID 2692 wrote to memory of 2540 2692 cmd.exe 32 PID 2692 wrote to memory of 2540 2692 cmd.exe 32 PID 2692 wrote to memory of 2540 2692 cmd.exe 32 PID 2692 wrote to memory of 2540 2692 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb1e254c8d1eb6e35a62fd68846cae62.exe"C:\Users\Admin\AppData\Local\Temp\bb1e254c8d1eb6e35a62fd68846cae62.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\bb1e254c8d1eb6e35a62fd68846cae62.exe" >> nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.13⤵
- Runs ping.exe
PID:2540
-
-