Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 19:59
Behavioral task
behavioral1
Sample
f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b.exe
-
Size
42KB
-
MD5
b6ec90b4dc6c098e11a4ea1d4197f486
-
SHA1
3d1fb89e1dfa0752926f9fa5196868c5cbfb6727
-
SHA256
f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b
-
SHA512
ac13a2efbc049d9d6cb13377a4f0564c4d2e116f7bd010cd2f4c00670b86693ad5826ecbfbd6fb0ca9005fe21d870c3f055f4de280a3233ebb564cccb0726587
-
SSDEEP
768:SCIqdH/k1ZVcT194jp4NS7OfZXNTc7NExGlD51y4F:SNqaLV8a6NSifZdo7NExGlqU
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/284-55-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b.exe File created C:\Windows\lsass.exe f23a6575b118de95b0113c018b486cdcac4b4399eedf1d7c5c317e8872dc396b.exe