Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 23:34

General

  • Target

    鑫财手机协议全能王/update.exe

  • Size

    1.7MB

  • MD5

    9cac857549f54ba77e04595a524829d7

  • SHA1

    c3c97c29a311b1c65402b3303f16f174b84e4c4c

  • SHA256

    28867e827caec329e1f40b870be0ff0fca315c9e89427816032749cfe083cb37

  • SHA512

    8a42438b7d940c433a3a3597a319418b441e6d35b894c6f8180ca8022a7d162c3f3a87d4b0db090df490744adcbd295a40b4b7745414079d34cfedf501730339

  • SSDEEP

    49152:LbtIYXqNjQUzBLEG5ArEOJ1Gd0rhS0P1E/x0:LbtIYIObEewKgcKu

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\鑫财手机协议全能王\update.exe
    "C:\Users\Admin\AppData\Local\Temp\鑫财手机协议全能王\update.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:2264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2264-132-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-133-0x00000000779B0000-0x0000000077B53000-memory.dmp

    Filesize

    1.6MB

  • memory/2264-134-0x0000000075B00000-0x0000000075D15000-memory.dmp

    Filesize

    2.1MB

  • memory/2264-136-0x0000000076FD0000-0x0000000077170000-memory.dmp

    Filesize

    1.6MB

  • memory/2264-137-0x0000000076740000-0x00000000767BA000-memory.dmp

    Filesize

    488KB

  • memory/2264-1260-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1261-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1262-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1263-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1265-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1266-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1267-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2264-1268-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB