Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:36
Behavioral task
behavioral1
Sample
d4f4d187bba2fc6a66a88c704a7497736a5f8a841daf3d81e6fa0ae9571661f3.exe
Resource
win7-20220901-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d4f4d187bba2fc6a66a88c704a7497736a5f8a841daf3d81e6fa0ae9571661f3.exe
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
d4f4d187bba2fc6a66a88c704a7497736a5f8a841daf3d81e6fa0ae9571661f3.exe
-
Size
20KB
-
MD5
91c38f9581d6d383138ddda631cb1a51
-
SHA1
40118badafeadc9151274e47beef2ee7aba11ebe
-
SHA256
d4f4d187bba2fc6a66a88c704a7497736a5f8a841daf3d81e6fa0ae9571661f3
-
SHA512
52fbf09b43a6234ae29135ed09737185aee6d99468d14d3f464ed7f34273a0b360803c3491bd8d60eab6405baa478106513380bc2936df591109a5a22602a91d
-
SSDEEP
384:eNr3+iQTWNPkDOEEqbc/vCAPQRgfdn/olPWWZfaQYQpbIoaqq93o+Hcl:BDkczjAqGF/IWWtjYQha1ZH
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1256-54-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mxd = "C:\\mxd\\svohcst.exe" d4f4d187bba2fc6a66a88c704a7497736a5f8a841daf3d81e6fa0ae9571661f3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1256 d4f4d187bba2fc6a66a88c704a7497736a5f8a841daf3d81e6fa0ae9571661f3.exe