Analysis
-
max time kernel
45s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe
Resource
win10v2004-20220812-en
General
-
Target
672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe
-
Size
84KB
-
MD5
737604a4f265e4ee351ea83d1fc9608a
-
SHA1
5fb08540506a251756836b36d881c8057143e761
-
SHA256
672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1
-
SHA512
5468a43ddd9948ef3da9eb0de6c2c49d66225ec4dc7234cc8ef7a2991a1b30595941c4007b970b20e9224418a3c197280e3e936b37cc613c447400673f86a50a
-
SSDEEP
1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUc:5m8nBjTmbxRBRN6WYiKqVo6Zc
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll 672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe File created C:\Windows\kernel.dll 672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe File created C:\Windows\svchost.exe 672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe File opened for modification C:\Windows\svchost.exe 672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1368 672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1280 1368 672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe"C:\Users\Admin\AppData\Local\Temp\672b54ba5c80393fe672edc0bf6567ff44cbfd9b21ba99151f696c79a4e67bf1.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368
-