Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 18:19

General

  • Target

    33e9cbd5_extracted.exe

  • Size

    1.6MB

  • MD5

    c34744468e6124c920efd107b0e2768e

  • SHA1

    ef6c560c197d9ec3292c9e8d733790ee8e0e297d

  • SHA256

    e034d8c2b661949aebbb83f84cccec141bab2d1f9d51b6a72812b79a1948c79c

  • SHA512

    398d2cb99360aa3329319931d087f58aac5cf4e424236e7b08b4008b98f93b204c2b8ecedc9c99a26c0b51fbc40860422b7dd649f783a0ed424cc71306b41b14

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e9cbd5_extracted.exe
    "C:\Users\Admin\AppData\Local\Temp\33e9cbd5_extracted.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads