Analysis

  • max time kernel
    38s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 23:53

General

  • Target

    37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01.exe

  • Size

    501KB

  • MD5

    2af3125fe1dc2d872ae96fa898d31025

  • SHA1

    520276bd895559d8cac8ba9829d467521a7b764e

  • SHA256

    37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01

  • SHA512

    8a497dd8fe4859f2f5f749bebdbac392fd40c051075e710504c51687ef9e8e008fb3294b36d666d46d36c73caa93748b25151239c96e4452be02ef1c0d4eb0b3

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01.exe
    "C:\Users\Admin\AppData\Local\Temp\37435a8ec0f7afabf767e08c57f5d0fcd7fbf1aa7cb6eab24c4178bdc40ffe01.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:756

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

4
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/756-54-0x00000000005F8000-0x0000000000632000-memory.dmp
    Filesize

    232KB

  • memory/756-55-0x00000000005F8000-0x0000000000632000-memory.dmp
    Filesize

    232KB

  • memory/756-56-0x0000000000400000-0x00000000004CA000-memory.dmp
    Filesize

    808KB

  • memory/756-57-0x00000000755B1000-0x00000000755B3000-memory.dmp
    Filesize

    8KB

  • memory/756-58-0x0000000000400000-0x00000000004CA000-memory.dmp
    Filesize

    808KB