Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 08:40
Static task
static1
Behavioral task
behavioral1
Sample
a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe
Resource
win10v2004-20220901-en
General
-
Target
a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe
-
Size
84KB
-
MD5
098fcb0b4012c2067366bbea0279872f
-
SHA1
686ca9878b2c877a75f467181258da05ac2ba34b
-
SHA256
a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851
-
SHA512
c9d123085e74b114921665017588788cfc89af632d85659ab14ba38a4e5a2900f58c653655e122fad2a17d02d4007d251c21ddd0f48ba302cb9fbf428e95222a
-
SSDEEP
1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUO:5m8nBjTmbxRBRN6WYiKqVo6ZO
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe File created C:\Windows\kernel.dll a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe File created C:\Windows\svchost.exe a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe File opened for modification C:\Windows\svchost.exe a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe 1388 a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2932 1388 a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe"C:\Users\Admin\AppData\Local\Temp\a9b8043f04d8f8d655f146c34fcdf68fe7bf8ac68a1c17a61b4f36209041b851.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388
-