Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
text.scr
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
text.scr
Resource
win10v2004-20231215-en
General
-
Target
text.scr
-
Size
76KB
-
MD5
9f273fb9b89bcaecc09740a08bb323f0
-
SHA1
e30028f0924770ce4ace3ab6360b7b79025f3356
-
SHA256
1b6ae6137baf03eaf2be42d5591381f2fe84d13111be5dd5b8d75dbfbfbc283f
-
SHA512
edd5777e4cc7249271d67eef40b8f89365725a23cbd0d2e12ba936738554302d4b6db1d9c7775ae999970ca21de90f17d47343e57bf26731009ffe3865494ade
-
SSDEEP
768:KhrjraNxlczzRHJ63AtecEoDecpJpDnxf6OC0conu4IO7migLV7NMDoLCSSSSSSr:KtOPSbjxlpfrgonuWmvntS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 taskgmrr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskgmrr.exe text.scr File opened for modification C:\Windows\SysWOW64\taskgmrr.exe text.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2608 3916 text.scr 85 PID 3916 wrote to memory of 2608 3916 text.scr 85 PID 3916 wrote to memory of 2608 3916 text.scr 85
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD59f273fb9b89bcaecc09740a08bb323f0
SHA1e30028f0924770ce4ace3ab6360b7b79025f3356
SHA2561b6ae6137baf03eaf2be42d5591381f2fe84d13111be5dd5b8d75dbfbfbc283f
SHA512edd5777e4cc7249271d67eef40b8f89365725a23cbd0d2e12ba936738554302d4b6db1d9c7775ae999970ca21de90f17d47343e57bf26731009ffe3865494ade