Analysis
-
max time kernel
154s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:00
Static task
static1
Behavioral task
behavioral1
Sample
Label.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Label.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Label.exe
-
Size
188KB
-
MD5
777b65292ce68269e662fdc18309c022
-
SHA1
109e593dea79fb8c84ed1579152e2b8f99185264
-
SHA256
b650e9c9ca92ba4d45d7740d17f7a3c715cd06899ce2e4189daafd1e1c670d5b
-
SHA512
e9310f63a10d1952fb998190db52c2c79131b38a81077de3ccc9642227b5e8b0ddad79815929f9dfc18799229d2e6edc4d0f666ee31b8ca328866d2b47da8dde
-
SSDEEP
3072:MVmqdG9Lbfjm2ORNLiXn2KEyZ1UMVYuWDyzUxIu:umq2bfjfOhyTHYiz4
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pfduqnmi = "\"C:\\Users\\Admin\\AppData\\Local\\wusksbrq.exe\"" svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Label.exepid process 1072 Label.exe 1072 Label.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Label.exedescription pid process target process PID 1072 wrote to memory of 2132 1072 Label.exe svchost.exe PID 1072 wrote to memory of 2132 1072 Label.exe svchost.exe PID 1072 wrote to memory of 2132 1072 Label.exe svchost.exe