Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 18:20

General

  • Target

    1f1a9872_extracted.exe

  • Size

    1.2MB

  • MD5

    cfb509fa676e77ce7313c03fdf476689

  • SHA1

    d9f5a74078e9f6a927f156bd4cd86ef4d7bff618

  • SHA256

    714e6862bcf2e1b6d1b5cc80fcee96b3ba4807236e533c843c5ffa055a1ebde7

  • SHA512

    7dd929a1f5ca3078d275ed4166682bd0f82e9ecc4d1b555658b8384482b67c1c4fb7c3f65f0032dfed8f59e29960c2ad7e0d9028f27a724f3f95e2678b9fdc70

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f1a9872_extracted.exe
    "C:\Users\Admin\AppData\Local\Temp\1f1a9872_extracted.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads