Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2023 18:02

General

  • Target

    tmp.exe

  • Size

    5.2MB

  • MD5

    b7b3d9c39854372b2b4eca4213bab256

  • SHA1

    533e7a9997de8e5fed702e623dc5d0c41df2d461

  • SHA256

    b34748df4525113b3dc212c943295b4c33ef7b956e89505fd5cf5fe66ee6845a

  • SHA512

    59af5cc6130efa6f3276096ccb7de913e797f4a15e9d6f3292c533dda41b21c91eaed52fa73fc234258dd9f062997af005ed9a4ff51008539fc61cc5f1a42e73

  • SSDEEP

    98304:Z6F6wSNExkQZSfmaoJhLgV+YR4mGurdGn0fdY6ka4uJ5eMFMnzvaJxxBANw:Z6KI5Z5cR4uE0lR4+55FMzvgDmw

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1752-54-0x0000000000400000-0x0000000000C7A000-memory.dmp
    Filesize

    8.5MB

  • memory/1752-58-0x0000000000400000-0x0000000000C7A000-memory.dmp
    Filesize

    8.5MB