Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 18:44
Behavioral task
behavioral1
Sample
c3654b989a52e338cb2ad1cd374c4561ddde2c3b91e186cac52d9484f91f41b3.exe
Resource
win7-20230712-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c3654b989a52e338cb2ad1cd374c4561ddde2c3b91e186cac52d9484f91f41b3.exe
Resource
win10v2004-20230824-en
2 signatures
150 seconds
General
-
Target
c3654b989a52e338cb2ad1cd374c4561ddde2c3b91e186cac52d9484f91f41b3.exe
-
Size
1.7MB
-
MD5
3e40ee332c2080d193bc1fafe8580c06
-
SHA1
974efaf2d38915a007454870d679159829d50fb8
-
SHA256
c3654b989a52e338cb2ad1cd374c4561ddde2c3b91e186cac52d9484f91f41b3
-
SHA512
48d00681c09102c0c3b96ea2d38599f8aa07001bc82e172c2c96888138844508b7493fae89eccc8a403adc6c34f14f070c664f45a493b0f5b0aa81c7d163da12
-
SSDEEP
49152:UN1S6M2uIH4VqkXbxWxdqQJvzH/9DalcCYijV9HrO:CA6MKOqg4PqQVFCYijVRS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3244-0-0x0000000000A00000-0x0000000000FAA000-memory.dmp upx behavioral2/memory/3244-2-0x0000000000A00000-0x0000000000FAA000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5A60F488-1FEF-48CC-B185-81720FE6B3C3}.catalogItem svchost.exe
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:2796
-
C:\Users\Admin\AppData\Local\Temp\c3654b989a52e338cb2ad1cd374c4561ddde2c3b91e186cac52d9484f91f41b3.exe"C:\Users\Admin\AppData\Local\Temp\c3654b989a52e338cb2ad1cd374c4561ddde2c3b91e186cac52d9484f91f41b3.exe"1⤵PID:3244