General
-
Target
triage_dropped_file
-
Size
413KB
-
Sample
210722-7yjcn4rban
-
MD5
1a0a3f41570af7287e65642c607a3746
-
SHA1
30851f92c3e1cdd0a2bfb52a803e8eef93bdb669
-
SHA256
bb63cf1bbf457836cdaa43876fe78270a6fb2feca8f304715b7d2f5b7b69285b
-
SHA512
f23d1586dd6a9c33358ce184ae13b4d58a26443973068519abfd428aa03152e52f21b2a53bdbd3a4e965a3fe1f15c4680f7a81a6c260c603e96ed2dc1e924e28
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
triage_dropped_file.dll
Resource
win10v20210410
Malware Config
Targets
-
-
Target
triage_dropped_file
-
Size
413KB
-
MD5
1a0a3f41570af7287e65642c607a3746
-
SHA1
30851f92c3e1cdd0a2bfb52a803e8eef93bdb669
-
SHA256
bb63cf1bbf457836cdaa43876fe78270a6fb2feca8f304715b7d2f5b7b69285b
-
SHA512
f23d1586dd6a9c33358ce184ae13b4d58a26443973068519abfd428aa03152e52f21b2a53bdbd3a4e965a3fe1f15c4680f7a81a6c260c603e96ed2dc1e924e28
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Suspicious use of SetThreadContext
-