General
-
Target
686b5240e5e503528cc5ac8d764883413a260716dd290f114a60af873ee6a65f
-
Size
322KB
-
Sample
220512-thfxksbah7
-
MD5
a3f4d926dd9e36327ff2e467a0a930bb
-
SHA1
08e865fb1cf421ce39a378221b4b452c868e6f18
-
SHA256
686b5240e5e503528cc5ac8d764883413a260716dd290f114a60af873ee6a65f
-
SHA512
016a361a6e74a144811c6d0a022a98987a142c88c974ae6c32f1bb510308cf6f549351e0dc08bcafd99d6270c8627898d5b960e9572cf9be6e5e70ad1e2e1532
Static task
static1
Behavioral task
behavioral1
Sample
686b5240e5e503528cc5ac8d764883413a260716dd290f114a60af873ee6a65f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
686b5240e5e503528cc5ac8d764883413a260716dd290f114a60af873ee6a65f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
686b5240e5e503528cc5ac8d764883413a260716dd290f114a60af873ee6a65f
-
Size
322KB
-
MD5
a3f4d926dd9e36327ff2e467a0a930bb
-
SHA1
08e865fb1cf421ce39a378221b4b452c868e6f18
-
SHA256
686b5240e5e503528cc5ac8d764883413a260716dd290f114a60af873ee6a65f
-
SHA512
016a361a6e74a144811c6d0a022a98987a142c88c974ae6c32f1bb510308cf6f549351e0dc08bcafd99d6270c8627898d5b960e9572cf9be6e5e70ad1e2e1532
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-