General
-
Target
9644d1e79dd1e23e85f2574f17ddf364cfe9cb18f1e655bc74fd93ec3bdde36b
-
Size
42KB
-
Sample
221107-wnxtdsbaf5
-
MD5
6a6cd7c648839e8e87734fa34ab92795
-
SHA1
c875944385097c824154b94f02247861b3a80e39
-
SHA256
9644d1e79dd1e23e85f2574f17ddf364cfe9cb18f1e655bc74fd93ec3bdde36b
-
SHA512
a0ee4b6a5f8a8e6d83778abe5277d7d357b2e0c86d23b3a1f3a3bb3289bcacd0c39d1ecdc2b07f21c8ece94d0b05afe9564256c1c45e5dc89a624f5555f0bdb7
-
SSDEEP
768:0O1oR/WVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzD0LP9fkwespx:0KS1FKnDtkuImkfkwespx
Behavioral task
behavioral1
Sample
9644d1e79dd1e23e85f2574f17ddf364cfe9cb18f1e655bc74fd93ec3bdde36b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9644d1e79dd1e23e85f2574f17ddf364cfe9cb18f1e655bc74fd93ec3bdde36b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Targets
-
-
Target
9644d1e79dd1e23e85f2574f17ddf364cfe9cb18f1e655bc74fd93ec3bdde36b
-
Size
42KB
-
MD5
6a6cd7c648839e8e87734fa34ab92795
-
SHA1
c875944385097c824154b94f02247861b3a80e39
-
SHA256
9644d1e79dd1e23e85f2574f17ddf364cfe9cb18f1e655bc74fd93ec3bdde36b
-
SHA512
a0ee4b6a5f8a8e6d83778abe5277d7d357b2e0c86d23b3a1f3a3bb3289bcacd0c39d1ecdc2b07f21c8ece94d0b05afe9564256c1c45e5dc89a624f5555f0bdb7
-
SSDEEP
768:0O1oR/WVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzD0LP9fkwespx:0KS1FKnDtkuImkfkwespx
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in System32 directory
-