General
-
Target
c76eaa1700b86d6dccf2662ec5dc92c884b72037c6d963a36705461b466ddb99
-
Size
48KB
-
Sample
220201-pt5b4aebdn
-
MD5
9f4863dc7d3ced05539183ddcb0a2f88
-
SHA1
5bfa025daa3724b7aaae25ceefb8e3166703c042
-
SHA256
c76eaa1700b86d6dccf2662ec5dc92c884b72037c6d963a36705461b466ddb99
-
SHA512
cfa8dc9f7816841a87ae1ef31a8d440f5881a5c4c066fbc097f5d654c02584081453499026764fcd723db6f6cb3a64e67e50da8e9b41b8814ef336022bf8072c
Static task
static1
Behavioral task
behavioral1
Sample
c76eaa1700b86d6dccf2662ec5dc92c884b72037c6d963a36705461b466ddb99.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c76eaa1700b86d6dccf2662ec5dc92c884b72037c6d963a36705461b466ddb99.dll
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
c76eaa1700b86d6dccf2662ec5dc92c884b72037c6d963a36705461b466ddb99
-
Size
48KB
-
MD5
9f4863dc7d3ced05539183ddcb0a2f88
-
SHA1
5bfa025daa3724b7aaae25ceefb8e3166703c042
-
SHA256
c76eaa1700b86d6dccf2662ec5dc92c884b72037c6d963a36705461b466ddb99
-
SHA512
cfa8dc9f7816841a87ae1ef31a8d440f5881a5c4c066fbc097f5d654c02584081453499026764fcd723db6f6cb3a64e67e50da8e9b41b8814ef336022bf8072c
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Sets service image path in registry
-