Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 05:32
Static task
static1
Behavioral task
behavioral1
Sample
transcript.htm.scr
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
transcript.htm.scr
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
transcript.htm.scr
-
Size
57KB
-
MD5
0ebbdd8d4d9714d893ea8f217cb38a65
-
SHA1
97d6498ea7548c2624b258705c8ad7c51d5ac252
-
SHA256
30aea209f4c83a228967568b2b20b36eb2e6ed6901f15bd5daacb485f51b0573
-
SHA512
6b8e3a79887335c7c8dc01fef3931882674179024e776c0c16df8c80c602a30e05ca164d633b7dcddd07c919775b1efd9c89332a54e1cabb3ab800a24dea3965
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1356-55-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
transcript.htm.scrdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" transcript.htm.scr -
Drops file in Windows directory 2 IoCs
Processes:
transcript.htm.scrdescription ioc process File opened for modification C:\Windows\lsass.exe transcript.htm.scr File created C:\Windows\lsass.exe transcript.htm.scr