General
-
Target
230a692437c58ad292480b63b2ed0d4f9b105c50967ace820c94908cf761546a
-
Size
42KB
-
Sample
221110-m34qtahcc3
-
MD5
4617028009902b4530adbfee151d3126
-
SHA1
186828382c2d4e3be2054675614bef990972b23a
-
SHA256
230a692437c58ad292480b63b2ed0d4f9b105c50967ace820c94908cf761546a
-
SHA512
3c6446fdb97f739a9ec1de1a5018b53d9ec13cdec7886b60952fceee3cc0e3a8ed58fc69a85949cb843d2defa99ce2bd0671112b191085cece8c0a978273d6da
-
SSDEEP
768:wO1oR/UVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDRufTwsylLO/O+:woS1FKnDtkuImTlLOX
Behavioral task
behavioral1
Sample
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\2864480368\+README-WARNING+.txt
Targets
-
-
Target
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043.exe
-
Size
42KB
-
MD5
8d809510a9ae7b8ef6fc6a25e5feaa22
-
SHA1
eb0888326adbbbdf1537a965c4d26c71549d43f6
-
SHA256
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043
-
SHA512
a9ed43be1285f73fda873ee0e39070d4cb3b4b5bd1e69b1506a42f4827f22d0d2f0ad2d25f204ea288f97f6eef787bf0133d0b3659bb8e815f55ff74210e557c
-
SSDEEP
768:PO1oR/UVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDRufTwsylLO/Ov:PoS1FKnDtkuImTlLOe
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops file in System32 directory
-