Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe
Resource
win10v2004-20220812-en
General
-
Target
c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe
-
Size
84KB
-
MD5
11a821fc00134e2030226055726f7046
-
SHA1
055c08168657a35c3e27cb49bf29c0998b8871bd
-
SHA256
c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2
-
SHA512
714d12aeb8bd8e4d85fdee4d07e76e8ba0c08b61d90a05797104242a8c7f18f2a96ffeddff6768afac973d4a887b70196cd5372893b3badace5dfd3962f9b6ab
-
SSDEEP
1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUG:5m8nBjTmbxRBRN6WYiKqVo6ZG
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe File created C:\Windows\kernel.dll c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe File created C:\Windows\svchost.exe c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe File opened for modification C:\Windows\svchost.exe c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 620 c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 620 wrote to memory of 1192 620 c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe"C:\Users\Admin\AppData\Local\Temp\c9cd67bb53baddb12b5db20c09e528a2cb8b2b32c3cc175e4734760910df3ca2.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:620
-