Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-04-2023 02:59
Static task
static1
Behavioral task
behavioral1
Sample
2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe
Resource
win10v2004-20230220-en
General
-
Target
2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe
-
Size
17KB
-
MD5
95933b62985a21d82a3d3b2ee87a4ff5
-
SHA1
57f0db016e44263ac6c7084fc2b871ff00a5c727
-
SHA256
375cd2456b4a9e7339438fa18d6acedb6b19cee38fa66f32d11df1741587852c
-
SHA512
2724e03149c0287499d1bb23d1e52e3161bb22b78ad858bd655ab56e6c030512a7bfe8cdc2e592a039fd784de000f43a62816b8681fee9b3a673a196cb80eceb
-
SSDEEP
384:19uTZHnVcaI2r4BCTXZhtam11fTgC01p1Xx99zpWwhWQWMvX:19u9CaxEovcm/BCvXd/X
Malware Config
Signatures
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\explorer.exe 2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe File opened for modification C:\Program Files (x86)\Windows NT\explorer.exe 2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe File opened for modification C:\Program Files (x86)\Windows NT\RCX4A5A.tmp 2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD595933b62985a21d82a3d3b2ee87a4ff5
SHA157f0db016e44263ac6c7084fc2b871ff00a5c727
SHA256375cd2456b4a9e7339438fa18d6acedb6b19cee38fa66f32d11df1741587852c
SHA5122724e03149c0287499d1bb23d1e52e3161bb22b78ad858bd655ab56e6c030512a7bfe8cdc2e592a039fd784de000f43a62816b8681fee9b3a673a196cb80eceb