Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 23:52
Behavioral task
behavioral1
Sample
bd210c12fb1f71c2220956c108552746.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd210c12fb1f71c2220956c108552746.exe
Resource
win10v2004-20240226-en
General
-
Target
bd210c12fb1f71c2220956c108552746.exe
-
Size
90KB
-
MD5
bd210c12fb1f71c2220956c108552746
-
SHA1
b639e2a8c0570572b7eba0ba4fe382d3ab63fff6
-
SHA256
27eb4e7471fe746b25ef9c4095a30cf86143e51dbc260c1e07a5db907d6b5f7d
-
SHA512
7265e7db61a743cacb6e6b3e009f745a9022796f15d03c2edee9d7efa15d5ea79f391e9eacf2e7e095f10b702e68dd542bc1f827a87e04054833acbc28971351
-
SSDEEP
1536:bJWCzhgJ+qCjQoNhKZirWh3y+46q86JwkU9/GwBdocFQBrl5JdzIsgH2h+34r/u9:bUWI+qC0CKUrhqH/GmdVQ3MWh3rG9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2372-8-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\__tmp$$100__.bat bd210c12fb1f71c2220956c108552746.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3032 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2704 2372 bd210c12fb1f71c2220956c108552746.exe 28 PID 2372 wrote to memory of 2704 2372 bd210c12fb1f71c2220956c108552746.exe 28 PID 2372 wrote to memory of 2704 2372 bd210c12fb1f71c2220956c108552746.exe 28 PID 2372 wrote to memory of 2704 2372 bd210c12fb1f71c2220956c108552746.exe 28 PID 2704 wrote to memory of 3032 2704 cmd.exe 30 PID 2704 wrote to memory of 3032 2704 cmd.exe 30 PID 2704 wrote to memory of 3032 2704 cmd.exe 30 PID 2704 wrote to memory of 3032 2704 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd210c12fb1f71c2220956c108552746.exe"C:\Users\Admin\AppData\Local\Temp\bd210c12fb1f71c2220956c108552746.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\__tmp$$100__.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 3 -w 10003⤵
- Runs ping.exe
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD54619fbbaf00f45686caf8bb932d740be
SHA1df455fbf351d1957dc444f092bf062b54324bacd
SHA25640203607a06c9323686e5bc270a7a322948b4521ceea12ea65c0d71be7ca119b
SHA512a449bf583a53c1224f4f8e782879e342208e7342ae33a70205efaba189988582193940e2cd229afdef5e6a997ff9bb1f8fe28832a243c2e2c749cfaa23b991ab