Analysis
-
max time kernel
37s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe
Resource
win10v2004-20220812-en
General
-
Target
98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe
-
Size
77KB
-
MD5
a268610d2eb87a81896bd7bf1a1848b0
-
SHA1
9e46f029d5da7e9693e8f652b99753ab4702c356
-
SHA256
98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d
-
SHA512
af5542650918bc0d98f3d93e8ff1b647c396475386bc1be366258f9b37d3ac71c9c458efd6e7edba8ccd2f295d7425d4c3497e8f92ee4989e92953beeb5bd922
-
SSDEEP
1536:TO+AZhCZFcsifjE0SJIB/6pCypfoe6WH/RgbZ:TO3ZhHsio0tBGCzoReZ
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll 98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe File created C:\Windows\kernel.dll 98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe File created C:\Windows\svchost.exe 98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe File opened for modification C:\Windows\svchost.exe 98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1652 98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1276 1652 98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe"C:\Users\Admin\AppData\Local\Temp\98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276