Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 18:19
Static task
static1
Behavioral task
behavioral1
Sample
33e9cbd5_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
33e9cbd5_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
33e9cbd5_extracted.exe
-
Size
1.6MB
-
MD5
c34744468e6124c920efd107b0e2768e
-
SHA1
ef6c560c197d9ec3292c9e8d733790ee8e0e297d
-
SHA256
e034d8c2b661949aebbb83f84cccec141bab2d1f9d51b6a72812b79a1948c79c
-
SHA512
398d2cb99360aa3329319931d087f58aac5cf4e424236e7b08b4008b98f93b204c2b8ecedc9c99a26c0b51fbc40860422b7dd649f783a0ed424cc71306b41b14
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
33e9cbd5_extracted.exepid process 776 33e9cbd5_extracted.exe 776 33e9cbd5_extracted.exe 776 33e9cbd5_extracted.exe 776 33e9cbd5_extracted.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
33e9cbd5_extracted.exedescription pid process Token: SeDebugPrivilege 776 33e9cbd5_extracted.exe Token: SeShutdownPrivilege 776 33e9cbd5_extracted.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
33e9cbd5_extracted.exepid process 776 33e9cbd5_extracted.exe 776 33e9cbd5_extracted.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/776-2-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/776-3-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-4-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-5-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-6-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-7-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-8-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-9-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-10-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-11-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-12-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/776-13-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB