Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
19-03-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
c50bca08a8e80850ec18d258ff937b7b72a500d9027c730c86b05aa73c938b5d.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c50bca08a8e80850ec18d258ff937b7b72a500d9027c730c86b05aa73c938b5d.exe
Resource
win10v2004-20220310-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c50bca08a8e80850ec18d258ff937b7b72a500d9027c730c86b05aa73c938b5d.exe
-
Size
2.9MB
-
MD5
994de6a3f96bd710d620e1396e1bec92
-
SHA1
53489b26fcceff4ef3240b2efcbfb38a78d24c4d
-
SHA256
c50bca08a8e80850ec18d258ff937b7b72a500d9027c730c86b05aa73c938b5d
-
SHA512
3e6e6e1554313f5b9fd082e5f147d7036439f66427e3ca066ed6a6429a5aae7bf70564fcfa3e2fc4853739bb8111c78ea0b404a8d81a60bccdd30ffb6e91fbf0
Score
1/10
Malware Config
Signatures
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c50bca08a8e80850ec18d258ff937b7b72a500d9027c730c86b05aa73c938b5d.exe"C:\Users\Admin\AppData\Local\Temp\c50bca08a8e80850ec18d258ff937b7b72a500d9027c730c86b05aa73c938b5d.exe"1⤵PID:2932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4704