Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/07/2024, 23:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
client.exe
Resource
win11-20240709-en
3 signatures
150 seconds
General
-
Target
client.exe
-
Size
38.4MB
-
MD5
ffa07d0a1be42d9fddb89850690e62b8
-
SHA1
f8d2ff1e8ada2c903b2fcf575e916c6d92623943
-
SHA256
d438cbb750c8ebc05e44a7643fbee10dc97aa1ae62f225db09771cfdd2242c55
-
SHA512
1e5111c1b504d85d6bfb3a1b3677017d244512dc11011189e6eb0ce86f84b7b38c2e10ea8306af8b171813da9b66979cf49757b9f6d4d407c104ab5c8d4859c7
-
SSDEEP
393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfR:fMguj8Q4Vfv8qFTrY7
Score
3/10
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3128 cmd.exe 2296 PING.EXE 1988 cmd.exe 2880 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2296 PING.EXE 2880 PING.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 784 wrote to memory of 1108 784 client.exe 84 PID 784 wrote to memory of 1108 784 client.exe 84 PID 1108 wrote to memory of 5020 1108 cmd.exe 85 PID 1108 wrote to memory of 5020 1108 cmd.exe 85 PID 784 wrote to memory of 5016 784 client.exe 86 PID 784 wrote to memory of 5016 784 client.exe 86 PID 5016 wrote to memory of 3016 5016 cmd.exe 87 PID 5016 wrote to memory of 3016 5016 cmd.exe 87 PID 784 wrote to memory of 2724 784 client.exe 88 PID 784 wrote to memory of 2724 784 client.exe 88 PID 2724 wrote to memory of 3056 2724 cmd.exe 89 PID 2724 wrote to memory of 3056 2724 cmd.exe 89 PID 784 wrote to memory of 3128 784 client.exe 90 PID 784 wrote to memory of 3128 784 client.exe 90 PID 3128 wrote to memory of 2296 3128 cmd.exe 91 PID 3128 wrote to memory of 2296 3128 cmd.exe 91 PID 784 wrote to memory of 2840 784 client.exe 92 PID 784 wrote to memory of 2840 784 client.exe 92 PID 784 wrote to memory of 1540 784 client.exe 93 PID 784 wrote to memory of 1540 784 client.exe 93 PID 784 wrote to memory of 3924 784 client.exe 94 PID 784 wrote to memory of 3924 784 client.exe 94 PID 784 wrote to memory of 4844 784 client.exe 95 PID 784 wrote to memory of 4844 784 client.exe 95 PID 784 wrote to memory of 2336 784 client.exe 96 PID 784 wrote to memory of 2336 784 client.exe 96 PID 2336 wrote to memory of 1816 2336 cmd.exe 97 PID 2336 wrote to memory of 1816 2336 cmd.exe 97 PID 784 wrote to memory of 1988 784 client.exe 99 PID 784 wrote to memory of 1988 784 client.exe 99 PID 1988 wrote to memory of 4592 1988 cmd.exe 100 PID 1988 wrote to memory of 4592 1988 cmd.exe 100 PID 1988 wrote to memory of 2880 1988 cmd.exe 101 PID 1988 wrote to memory of 2880 1988 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl"2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\curl.execurl3⤵PID:5020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl ipcheck.info"2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\curl.execurl ipcheck.info3⤵PID:3016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "curl ipcheck.info"2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\curl.execurl ipcheck.info3⤵PID:3056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "ping"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\system32\PING.EXEping3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "szacun"2⤵PID:2840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start google.com"2⤵PID:1540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start google"2⤵PID:3924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start ps.exe"2⤵PID:4844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\cmd.execmd3⤵PID:1816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start cmd && ping google.com"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.execmd3⤵PID:4592
-
-
C:\Windows\system32\PING.EXEping google.com3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2880
-
-