Analysis
-
max time kernel
596s -
max time network
597s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 21:41
Static task
static1
Behavioral task
behavioral1
Sample
876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe
-
Size
13KB
-
MD5
af1a1fa898e3e42bea3e05809be20882
-
SHA1
79b65ae9d0908e52e0b3888e34a01b9bed50ec4b
-
SHA256
876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a
-
SHA512
73ee9d44465f497adb74f52348d41f5dace937f5689a67eb4dc07e9813149c393b2802b5327cb0b92c9c21310cab3b0f9b699092dfe31928b4cf70ff316bf4bd
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exedescription ioc process File created C:\Windows\Tasks\wow64.job 876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe File opened for modification C:\Windows\Tasks\wow64.job 876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 320 wrote to memory of 472 320 taskeng.exe 876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe PID 320 wrote to memory of 472 320 taskeng.exe 876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe PID 320 wrote to memory of 472 320 taskeng.exe 876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe PID 320 wrote to memory of 472 320 taskeng.exe 876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe"C:\Users\Admin\AppData\Local\Temp\876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe"1⤵
- Drops file in Windows directory
PID:800
-
C:\Windows\system32\taskeng.exetaskeng.exe {5439EFA1-5F3E-4748-AB1C-00505E7A3557} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exeC:\Users\Admin\AppData\Local\Temp\876c2b332d0534704447ab5f04d0eb20ff1c150fd60993ec70812c2c2cad3e6a.exe start2⤵PID:472
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1492