Analysis

  • max time kernel
    235s
  • max time network
    298s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    29-06-2022 19:14

General

  • Target

    Setup1Crakedz.exe

  • Size

    19.3MB

  • MD5

    d527fd56158f5b3bf43f58f0ab6d3cc7

  • SHA1

    d742a54b70dc0b95d9e823609d982bbe9d03f548

  • SHA256

    b22b77edf760cc0a9b0522be2ba51c9f252106881fc2175213d6290673ca49b6

  • SHA512

    d992ccb81231ae7d1ccc415344df1db5cfcf7d8afb5601a6bde5d10615c3715df4ed096def76451589c68a08d463f63b078d4b7ae40e8ed3a609fbe6527de6e8

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup1Crakedz.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup1Crakedz.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4468-130-0x00000000004E0000-0x0000000001001000-memory.dmp

    Filesize

    11.1MB

  • memory/4468-132-0x00000000004E0000-0x0000000001001000-memory.dmp

    Filesize

    11.1MB

  • memory/4468-133-0x00000000004E0000-0x0000000001001000-memory.dmp

    Filesize

    11.1MB

  • memory/4468-134-0x00000000004E0000-0x0000000001001000-memory.dmp

    Filesize

    11.1MB