General
-
Target
WSGaRIW.dll
-
Size
140KB
-
Sample
201119-5nq2lbgg8x
-
MD5
4fbee1cbb17b4a05ae5b5431a76087fb
-
SHA1
44ffaa43eb2bba71325d406703ad82e010376cac
-
SHA256
e02483eca255879ba6a57365dbecb56f5049283d8cd3f030dceca5c69f7af161
-
SHA512
f1c0cf3e5f00e63d8edcb1cf171fde79b72945ab0d9bdd8a4ecb84b3a2b37d08eec0a59926b10a6cfaa97409a5bcb372805d09aab5e9248cde85bcb5b83fec93
Static task
static1
Behavioral task
behavioral1
Sample
WSGaRIW.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
WSGaRIW.dll
Resource
win10v20201028
Malware Config
Targets
-
-
Target
WSGaRIW.dll
-
Size
140KB
-
MD5
4fbee1cbb17b4a05ae5b5431a76087fb
-
SHA1
44ffaa43eb2bba71325d406703ad82e010376cac
-
SHA256
e02483eca255879ba6a57365dbecb56f5049283d8cd3f030dceca5c69f7af161
-
SHA512
f1c0cf3e5f00e63d8edcb1cf171fde79b72945ab0d9bdd8a4ecb84b3a2b37d08eec0a59926b10a6cfaa97409a5bcb372805d09aab5e9248cde85bcb5b83fec93
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blacklisted process makes network request
-