Analysis
-
max time kernel
152s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:26
Behavioral task
behavioral1
Sample
ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e.exe
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e.exe
-
Size
47KB
-
MD5
8193fb72db5fa16c80cc5199a49b4380
-
SHA1
ca680c01f9d5b8608a28bd0f62ee9a461244eb95
-
SHA256
ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e
-
SHA512
42ab1c9e5bb98cf50f3fe70ead9d915883344ece53ff61dbbbb25716d341dd2c468d248f97742381a78929a2150f0866dba1370ce5cae67d3ba32bb9b2398445
-
SSDEEP
768:SCIqdH/k1ZVcT194jp4EqdNONKY/MM5OJ+7/RezylKG4:SNqaLV8a6EqTWKY/tg+7NlX4
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1852-55-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e.exe File created C:\Windows\lsass.exe ec57d9878502fbc26488a6c6aa94aad961976551160a10a624e457ba346b6c1e.exe