Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-08-2022 08:52
Behavioral task
behavioral1
Sample
WMI.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
WMI.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
WMI.exe
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
WMI.exe
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
WMI.exe
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
WMI.exe
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
WMI.exe
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral8
Sample
WMI.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral9
Sample
WMI.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
WMI.exe
Resource
debian9-mipsel-en-20211208
General
-
Target
WMI.exe
-
Size
3.0MB
-
MD5
676758f128778998528135577dff284b
-
SHA1
54e7047afa90e0b559a2eae17f77148c643b3203
-
SHA256
54e7eb310fbba8c3ad41bb284180f9839cd4a2436da36b33404fc04460c449a8
-
SHA512
c7e866bc0e57b5ca10166c086e1e7f14a15f25c5f13862e1d64d712a9ce06da83690465a9bc0891fc6e4413b0ffde3004efe42a4e178a58a15b23fd623e9ab3c
-
SSDEEP
49152:F7ckrHpr8vDS5gEgwccVym0LWN/giMhiYB1N03mcwR3J:h5rH6OiEgGh0s7MhB1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2028 1728 control.exe 28 PID 1728 wrote to memory of 2028 1728 control.exe 28 PID 1728 wrote to memory of 2028 1728 control.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\WMI.exe"C:\Users\Admin\AppData\Local\Temp\WMI.exe"1⤵PID:1972
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" "C:\Windows\system32\ncpa.cpl",1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\ncpa.cpl",2⤵PID:2028
-