Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:26
Behavioral task
behavioral1
Sample
a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88.exe
Resource
win10v2004-20220901-en
General
-
Target
a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88.exe
-
Size
30KB
-
MD5
901ec5d3992851a161011fb8f6029830
-
SHA1
b6e0f3cb88bbc3ffd757be9d31d8f04429e96bed
-
SHA256
a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88
-
SHA512
f8d5abf4e4ba1bf7179af85b02e121cd25600f60911c1e0255d2103f8542bc01d1985d21155657d139808fc2327392c9cb59933adf5763759366af0bc9306a71
-
SSDEEP
384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUbJigK8OP5e54faEyQ5n9RXLq9d:SCIqdH/k1ZVcT194jp4bs05gn9Jcnd
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1324-55-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88.exe File created C:\Windows\lsass.exe a9fd45c496b410a7d3144f71fc4ed9091f8963ab9fe489bd8c71185cf6b1bb88.exe