Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 14:13
Static task
static1
Behavioral task
behavioral1
Sample
6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe
Resource
win10v2004-20220812-en
General
-
Target
6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe
-
Size
84KB
-
MD5
93f1138d83c77efafb97a3c87110a554
-
SHA1
a5cb1954a78206f4746d96c4178798bb548b609f
-
SHA256
6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199
-
SHA512
07f1647f0b8ecba070b71a6c60f3680714d10f033d6300dc2977aff79435a3c864027d5a7ecbd48a696390c7841a499a2a30a1d4ef8b3ad77b54f6028a7f3322
-
SSDEEP
1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUB:5m8nBjTmbxRBRN6WYiKqVo6ZB
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll 6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe File created C:\Windows\kernel.dll 6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe File created C:\Windows\svchost.exe 6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe File opened for modification C:\Windows\svchost.exe 6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1948 6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1284 1948 6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe"C:\Users\Admin\AppData\Local\Temp\6320ceb8a1964472bcd31cedbaf4a728decc9c1a9bc11ab508e3f1cacbbc8199.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948
-