General
-
Target
66bfc2229570bd459028fbf92dd31cf2adb1895024e23ed6492ecdd33f1cd734
-
Size
44KB
-
Sample
220201-pvbfeaecbm
-
MD5
f4a46279bad62b50509c8729ba55b1fa
-
SHA1
0be2b50b31c4a22df95942081b1c0e13e3c79850
-
SHA256
66bfc2229570bd459028fbf92dd31cf2adb1895024e23ed6492ecdd33f1cd734
-
SHA512
4325d47236cf796e1a169a4971c40cf9367de59bc435592c8857df8359c510209fa2b850331682393bd3abd005b09610270c7e40c5a4b6d680554cb21b285b4f
Static task
static1
Behavioral task
behavioral1
Sample
66bfc2229570bd459028fbf92dd31cf2adb1895024e23ed6492ecdd33f1cd734.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
66bfc2229570bd459028fbf92dd31cf2adb1895024e23ed6492ecdd33f1cd734.dll
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
66bfc2229570bd459028fbf92dd31cf2adb1895024e23ed6492ecdd33f1cd734
-
Size
44KB
-
MD5
f4a46279bad62b50509c8729ba55b1fa
-
SHA1
0be2b50b31c4a22df95942081b1c0e13e3c79850
-
SHA256
66bfc2229570bd459028fbf92dd31cf2adb1895024e23ed6492ecdd33f1cd734
-
SHA512
4325d47236cf796e1a169a4971c40cf9367de59bc435592c8857df8359c510209fa2b850331682393bd3abd005b09610270c7e40c5a4b6d680554cb21b285b4f
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Sets service image path in registry
-