General
-
Target
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7
-
Size
42KB
-
Sample
221107-wn5t1addfk
-
MD5
c84a88c6676ad0d3c8330c8d95324e1d
-
SHA1
4f2277a86825bba3917290fd95416210c5ca6a4a
-
SHA256
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7
-
SHA512
4df47dffa0e1be95ac7c33f5d4707abaf24a20224262f3ced41f06b79696d2d83cb8d175f7112c004ff1a5e05d7c5ad40dededd786be33e7b9672c30ed84230a
-
SSDEEP
768:8O1oR/YVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzD8hOT11+2p1tK5v6:8ES1FKnDtkuIm8S82HMy
Behavioral task
behavioral1
Sample
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\1551054063\+README-WARNING+.txt
Targets
-
-
Target
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7
-
Size
42KB
-
MD5
c84a88c6676ad0d3c8330c8d95324e1d
-
SHA1
4f2277a86825bba3917290fd95416210c5ca6a4a
-
SHA256
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7
-
SHA512
4df47dffa0e1be95ac7c33f5d4707abaf24a20224262f3ced41f06b79696d2d83cb8d175f7112c004ff1a5e05d7c5ad40dededd786be33e7b9672c30ed84230a
-
SSDEEP
768:8O1oR/YVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzD8hOT11+2p1tK5v6:8ES1FKnDtkuIm8S82HMy
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in System32 directory
-