Analysis
-
max time kernel
34s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 18:25
Static task
static1
Behavioral task
behavioral1
Sample
a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe
-
Size
1.6MB
-
MD5
5b305ebf70fa30b9fa99dfb27ff07f60
-
SHA1
54711aca678363e5af1674a158edb7fffc26a985
-
SHA256
a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49
-
SHA512
643ccb1d5ef37c4acb0cf658a457a0c2b9a0697dd744c1c94ece6ba6008c5487b831d55ad6f50c6801f42d8c358b7ef39ef51e0e32472e1144c92fedff5ffcce
Score
1/10
Malware Config
Signatures
-
Modifies registry class 7 IoCs
Processes:
a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "63f0b6c2a1f2425119f96b7f292093e9" a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} a5f8319e230bf2cbe2be5406e42072cbae69086979232912bc49feaea56d5c49.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1280-54-0x00000000756E1000-0x00000000756E3000-memory.dmpFilesize
8KB