Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
75064c3de40b56cd224ece7073ca681c.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
75064c3de40b56cd224ece7073ca681c.exe
-
Size
16KB
-
MD5
75064c3de40b56cd224ece7073ca681c
-
SHA1
d349daf274c5707085a169321842dad962d1ea00
-
SHA256
f3a8bdeffd47306df3570b891ee746b8dd95b622f9241edb0aca313df2a9c02a
-
SHA512
34caa9a746397e4bd3c5d837b714a515ff0b8e37e08d978de6ecfe12df7ccfd166ef13d5b893da20a533b661b50f80e933c6246f94b43485dad76959cca6c9ec
-
SSDEEP
384:JvLQDvXieQVtIfaOwh1ZICF4mXaonTm9UM2yHbdThOo9iJDqWzDQBbdtn4F5ZFF:JvU1aOw7ZGmtCftKSq+gi4TZ3
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
75064c3de40b56cd224ece7073ca681c.exedescription ioc process File opened for modification C:\Windows\SysWOW64\svchost.exe 75064c3de40b56cd224ece7073ca681c.exe File created C:\Windows\SysWOW64\svchost.exe 75064c3de40b56cd224ece7073ca681c.exe -
Drops file in Windows directory 2 IoCs
Processes:
75064c3de40b56cd224ece7073ca681c.exedescription ioc process File created C:\Windows\debug\dsadfhj.txt 75064c3de40b56cd224ece7073ca681c.exe File opened for modification C:\Windows\debug\dsadfhj.txt 75064c3de40b56cd224ece7073ca681c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75064c3de40b56cd224ece7073ca681c.exe"C:\Users\Admin\AppData\Local\Temp\75064c3de40b56cd224ece7073ca681c.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe1⤵PID:2736