Analysis
-
max time kernel
111s -
max time network
121s -
resource
win7v191014
Task
task1
Sample
461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe
Resource
win7v191014
0 signatures
Task
task2
Sample
461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe
Resource
win10v191014
0 signatures
General
-
Target
461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b
-
Sample
191025-pzkgezzrxa
-
SHA256
461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b
Score
N/A
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc pid Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk 1412 461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2000 1412 461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe 26 -
Executes dropped EXE 1 IoCs
pid Process 2000 IntelRapid.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2000 IntelRapid.exe -
Loads dropped DLL 1 IoCs
pid Process 1412 461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe"C:\Users\Admin\AppData\Local\Temp\461add8a256e74ca872b6eccd281fc9026ff8a24900eaf4a27267e189ddec67b.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:1412
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2000