Analysis
-
max time kernel
87s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2023, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
e40c02fde9cd71faef1d2c1f3f4cebbf8a98fbd5f219e8c5e04bd780684dfe29.zip
Resource
win10v2004-20230221-en
1 signatures
150 seconds
General
-
Target
e40c02fde9cd71faef1d2c1f3f4cebbf8a98fbd5f219e8c5e04bd780684dfe29.zip
-
Size
254KB
-
MD5
25664e340917e22ca622bfe13a608b34
-
SHA1
72255986fc86c53f32b678f48e4e4f3728b03a40
-
SHA256
e40c02fde9cd71faef1d2c1f3f4cebbf8a98fbd5f219e8c5e04bd780684dfe29
-
SHA512
ac075500d3f79b053227c00002a0e24c597f4e18e0576fa3c8bead6e7d894b9d5456b4d37f01c9494c4deeb894639e25587870702e66c5b0875e57ab4597373f
-
SSDEEP
3072:1FLKTOOue+ySCi6aKq3XHnf/vPDjTz52mGMsc80UEkQwgAY4oIRxhB5ZJpV1lFVB:1eHay
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid 4
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\e40c02fde9cd71faef1d2c1f3f4cebbf8a98fbd5f219e8c5e04bd780684dfe29.zip1⤵PID:1344
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3712