Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe
Resource
win10v2004-20220812-en
General
-
Target
f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe
-
Size
85KB
-
MD5
0be7917612263046bdefeb630e04aa40
-
SHA1
0013bfad7936f163db6183c632c3628cfe5adcc5
-
SHA256
f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb
-
SHA512
df1d57813674f704fa0a228ad36780a9e5ab04e38f2c6ff2016ca49541ddc3f275b33b19143f209664b559efabd386447e4fa71807bad146a249197dd65db0ab
-
SSDEEP
1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUI:5m8nBjTmbxRBRN6WYiKqVo6ZI
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe File created C:\Windows\kernel.dll f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe File created C:\Windows\svchost.exe f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe File opened for modification C:\Windows\svchost.exe f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1712 f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1224 1712 f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe"C:\Users\Admin\AppData\Local\Temp\f0211bdccbb685df69c3b5e39166fc8d85a65a2c4c6987f7387946a6d02e3cdb.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712
-