Analysis
-
max time kernel
162s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 01:13
Behavioral task
behavioral1
Sample
c466df2bcbd8e1aa097dcb19029965da531f474f02d86ea0ad01db399fba676f.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c466df2bcbd8e1aa097dcb19029965da531f474f02d86ea0ad01db399fba676f.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
c466df2bcbd8e1aa097dcb19029965da531f474f02d86ea0ad01db399fba676f.exe
-
Size
11KB
-
MD5
71027dabb08ccd8231d898223d83fa9e
-
SHA1
d6e5967d07a10f0e7847bcd0194ce1c67d72694f
-
SHA256
c466df2bcbd8e1aa097dcb19029965da531f474f02d86ea0ad01db399fba676f
-
SHA512
c8eedbe37e90904f45b9c6d8ee2460696abe61e2f4848af9f3fe68da1f68b516559dc817c64139493c5a11bca824d0ed4cca1bdbaa180c73827747536c60b95a
-
SSDEEP
192:l0npNo92f9NfkFd0xTLlWEOscjDD89H4NqGyff2rx2lpbQps:eNo9LuxTJWccjX898Af2Y70a
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1648-54-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1648-55-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcgmg.exe c466df2bcbd8e1aa097dcb19029965da531f474f02d86ea0ad01db399fba676f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1648 c466df2bcbd8e1aa097dcb19029965da531f474f02d86ea0ad01db399fba676f.exe