Analysis
-
max time kernel
175s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:21
Behavioral task
behavioral1
Sample
7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea.exe
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea.exe
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea.exe
-
Size
34KB
-
MD5
87ce1cb31ce616fe9cb151596e55182f
-
SHA1
afc859ae99e185b2291453accd90846d8dbc7b5b
-
SHA256
7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea
-
SHA512
a6bd60f6822d8dbe8a997bd2d970e8b5620bab6c69368c5a2d63b129ebe43ee980eeb24196f774f68d1fd711c1472965cbdbc61c7741184c41f4173c5dd8743d
-
SSDEEP
768:SCIqdH/k1ZVcT194jp4Tmh/jpCwhW2NOzgwL:SNqaLV8a6K1NwH
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1984-54-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral1/memory/1984-56-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" 7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe 7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea.exe File created C:\Windows\lsass.exe 7ccda29962346c5be332fc6507324cd9b9152a5760720ad046b0a242439c24ea.exe