Analysis

  • max time kernel
    28s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 02:22

General

  • Target

    A94DF8607EC00DB78D4E4EE91A5CAA49.exe

  • Size

    379KB

  • MD5

    a94df8607ec00db78d4e4ee91a5caa49

  • SHA1

    0b261f27dbcbd51fc4073ec4959081fb68aea573

  • SHA256

    da816e315d1130151e152d0e390be7ffec1272503ed5368c3957eeeb9c9fdea9

  • SHA512

    257b95e307cbc5419678b461fef4f2d729f365768159acb45a86f04bc55b5a704d88f1a140949b8ada6b98b0cae537c0282e831d40184a97c3766f66b0486938

  • SSDEEP

    6144:jCRqZ7gWMN93Hl7afE+yptBGXts9J0u/QnB6LrPwlic3u7J:+Rqqx93cfEXOXtR0nPwlPuV

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\A94DF8607EC00DB78D4E4EE91A5CAA49.exe
    "C:\Users\Admin\AppData\Local\Temp\A94DF8607EC00DB78D4E4EE91A5CAA49.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab54A8.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • memory/2256-54-0x00000000005C0000-0x0000000000606000-memory.dmp

    Filesize

    280KB

  • memory/2256-55-0x000000001A560000-0x000000001A5E0000-memory.dmp

    Filesize

    512KB

  • memory/2256-56-0x000000001A560000-0x000000001A5E0000-memory.dmp

    Filesize

    512KB

  • memory/2256-73-0x000000001A560000-0x000000001A5E0000-memory.dmp

    Filesize

    512KB