Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 23:52
Behavioral task
behavioral1
Sample
bd210c12fb1f71c2220956c108552746.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd210c12fb1f71c2220956c108552746.exe
Resource
win10v2004-20240226-en
General
-
Target
bd210c12fb1f71c2220956c108552746.exe
-
Size
90KB
-
MD5
bd210c12fb1f71c2220956c108552746
-
SHA1
b639e2a8c0570572b7eba0ba4fe382d3ab63fff6
-
SHA256
27eb4e7471fe746b25ef9c4095a30cf86143e51dbc260c1e07a5db907d6b5f7d
-
SHA512
7265e7db61a743cacb6e6b3e009f745a9022796f15d03c2edee9d7efa15d5ea79f391e9eacf2e7e095f10b702e68dd542bc1f827a87e04054833acbc28971351
-
SSDEEP
1536:bJWCzhgJ+qCjQoNhKZirWh3y+46q86JwkU9/GwBdocFQBrl5JdzIsgH2h+34r/u9:bUWI+qC0CKUrhqH/GmdVQ3MWh3rG9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1172-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/1172-3-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\__tmp$$100__.bat bd210c12fb1f71c2220956c108552746.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4456 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3704 1172 bd210c12fb1f71c2220956c108552746.exe 92 PID 1172 wrote to memory of 3704 1172 bd210c12fb1f71c2220956c108552746.exe 92 PID 1172 wrote to memory of 3704 1172 bd210c12fb1f71c2220956c108552746.exe 92 PID 3704 wrote to memory of 4456 3704 cmd.exe 94 PID 3704 wrote to memory of 4456 3704 cmd.exe 94 PID 3704 wrote to memory of 4456 3704 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd210c12fb1f71c2220956c108552746.exe"C:\Users\Admin\AppData\Local\Temp\bd210c12fb1f71c2220956c108552746.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\__tmp$$100__.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 3 -w 10003⤵
- Runs ping.exe
PID:4456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD54619fbbaf00f45686caf8bb932d740be
SHA1df455fbf351d1957dc444f092bf062b54324bacd
SHA25640203607a06c9323686e5bc270a7a322948b4521ceea12ea65c0d71be7ca119b
SHA512a449bf583a53c1224f4f8e782879e342208e7342ae33a70205efaba189988582193940e2cd229afdef5e6a997ff9bb1f8fe28832a243c2e2c749cfaa23b991ab