Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2023 08:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
chromedump.exe
Resource
win7-20230831-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
chromedump.exe
Resource
win10v2004-20230831-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
chromedump.exe
-
Size
660KB
-
MD5
e468cade55308ee32359e2d1a88506ef
-
SHA1
278eb15a04c93a90f3f5ef7f88641f0f41fac5bc
-
SHA256
f618e9fa05c392501fb76415d64007225fe20baddc9f1a2dcc9ff3599473a8eb
-
SHA512
82fef308bc65616efb77b3f97ff7fcd14623a3955d18a9afff5c086d85d0f2e6856468ad992da2fb01aae6488afb0c0cdb80744cc20d74d3af851f35d30947d6
-
SSDEEP
12288:oymg4BvDLjNSwO+ocal447iMaNHH8WpKG23J5qIspRQ8RzIA7t80xVJW:oyUvDLJvO+0ldi5B8WpKG2ZYICQyIelo
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8DF2F71A-7D21-4FFC-8DBF-A9979C39BA13}.catalogItem svchost.exe