General
-
Target
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
-
Size
42KB
-
Sample
221107-wnwlbsdddm
-
MD5
65b228bf3272e41025480c9780f7cdd3
-
SHA1
e29ba9d7767fbdf686e231701b6b3a329f1a0484
-
SHA256
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
-
SHA512
e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54
-
SSDEEP
768:xO1oR/hjVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDsFGtnhidVY4ss2+X4:x55S1FKnDtkuImiwiDY4sXd
Behavioral task
behavioral1
Sample
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Targets
-
-
Target
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
-
Size
42KB
-
MD5
65b228bf3272e41025480c9780f7cdd3
-
SHA1
e29ba9d7767fbdf686e231701b6b3a329f1a0484
-
SHA256
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
-
SHA512
e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54
-
SSDEEP
768:xO1oR/hjVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDsFGtnhidVY4ss2+X4:x55S1FKnDtkuImiwiDY4sXd
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in System32 directory
-