Analysis
-
max time kernel
3s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-07-2021 23:14
Static task
static1
Behavioral task
behavioral1
Sample
d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe
-
Size
890KB
-
MD5
561cffbaba71a6e8cc1cdceda990ead4
-
SHA1
5162f14d75e96edb914d1756349d6e11583db0b0
-
SHA256
d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
-
SHA512
09149b9825db2c9e6d2ec6665abc64b0b7aaafaa47c921c5bf0062cd7bedd1fc64cf54646a098f45fc4b930f5fbecee586fe839950c9135f64ea722b00baa50e
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1804 MsMpEng.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mpsvc.dll d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe File created C:\Windows\MsMpEng.exe d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 736 wrote to memory of 1804 736 d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe 26 PID 736 wrote to memory of 1804 736 d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe 26 PID 736 wrote to memory of 1804 736 d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe 26 PID 736 wrote to memory of 1804 736 d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe"C:\Users\Admin\AppData\Local\Temp\d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\MsMpEng.exe"C:\Windows\MsMpEng.exe"2⤵
- Executes dropped EXE
PID:1804
-