Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/09/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
lool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
lool.exe
Resource
win11-20240802-en
General
-
Target
lool.exe
-
Size
27KB
-
MD5
60fb232d4620da65952911bee279a253
-
SHA1
a97ea8eb050359580ce2e468ec4f35b4dc4cf938
-
SHA256
2e70ae7d9731f2e9f3c639609206d8883c8621efc7dea3a4c256875efe31642a
-
SHA512
65d0c9a56f85a9488add41df3a2b86501c24cd2a1a726ee50a1c817f026719066ebf1747b44a222a1deaac025c1498aa8281ef218193f8e9e29d0a4c13bde9ce
-
SSDEEP
384:oy/AwToHDe7NsYRQGgoAqBrkxhCv9Xy/5RMyRwMqEiSvfnosqj3rX4Z:sxHDDYiGgOChCFXc5RtYHuoso3rI
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1168 cmd.exe 4992 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4992 PING.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1168 2448 lool.exe 80 PID 2448 wrote to memory of 1168 2448 lool.exe 80 PID 1168 wrote to memory of 4992 1168 cmd.exe 81 PID 1168 wrote to memory of 4992 1168 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\lool.exe"C:\Users\Admin\AppData\Local\Temp\lool.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ping api.synapsez.net > status.tmp2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\PING.EXEping api.synapsez.net3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438B
MD55c14ed30b4ccd9f846c3dc5483a05ca1
SHA1365607c987165da7331ad8a5ed27622bac3e6a22
SHA256ffe078a7a304a876d2ed6db96497ddcebfd8ffde4a575f4fe25ea33436fb7af9
SHA51259c385e51806ee72658c27d8879e50bd2c90d3897e425ee1595bb799b7f92f2ec80a6d3399cce6a24916dfdcc710c738705a3b5bf4321c5e6c7e0a8e0ae36f64