General
-
Target
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec
-
Size
42KB
-
Sample
221107-wpa11sddgm
-
MD5
fb58b644c3aafb587a2a377018b07b0f
-
SHA1
9d58212ae8b2722dde38903af0c4792a79133f31
-
SHA256
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec
-
SHA512
a4d9af4c0833fb844f9d5a8f98f5749038140678b94f39f5fcf65b49ddec692e230bd29ee96b7a95987da12fef2d93f564512d86993910fe0471e83b0674d6b8
-
SSDEEP
768:MO1oR/IVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDYMeWFqtIxroMG:M0S1FKnDtkuIm/gyxr0
Behavioral task
behavioral1
Sample
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Targets
-
-
Target
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec
-
Size
42KB
-
MD5
fb58b644c3aafb587a2a377018b07b0f
-
SHA1
9d58212ae8b2722dde38903af0c4792a79133f31
-
SHA256
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec
-
SHA512
a4d9af4c0833fb844f9d5a8f98f5749038140678b94f39f5fcf65b49ddec692e230bd29ee96b7a95987da12fef2d93f564512d86993910fe0471e83b0674d6b8
-
SSDEEP
768:MO1oR/IVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDYMeWFqtIxroMG:M0S1FKnDtkuIm/gyxr0
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in System32 directory
-