Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2023, 20:00

General

  • Target

    640821a8b500cd14d79f7ab2c7ab62a9bc2c24c1028fa8a482b588ea9234a81c.exe

  • Size

    2.2MB

  • MD5

    a5b20d2787f4e34ab8f7f10682bfeb7b

  • SHA1

    ddab7d9be97cc3b3233895f261529c4b90c20a52

  • SHA256

    640821a8b500cd14d79f7ab2c7ab62a9bc2c24c1028fa8a482b588ea9234a81c

  • SHA512

    20851badb6039822faf008c8ea555adbd7b29399145fa37c5154630c22d23e5775d983164002150e1db9c76c3e7f7a072bee20d2b9379556f15232cd2981d78a

  • SSDEEP

    49152:4ysjt0ExBDaT2/sxFzqVPTr9AWIhDDke5lcUj4JgfWRtR0+W:7ut0ExBuT2MgVFyWUjP8RE

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\640821a8b500cd14d79f7ab2c7ab62a9bc2c24c1028fa8a482b588ea9234a81c.exe
    "C:\Users\Admin\AppData\Local\Temp\640821a8b500cd14d79f7ab2c7ab62a9bc2c24c1028fa8a482b588ea9234a81c.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1216-133-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-134-0x0000000075F60000-0x0000000076175000-memory.dmp

    Filesize

    2.1MB

  • memory/1216-4008-0x0000000076330000-0x00000000764D0000-memory.dmp

    Filesize

    1.6MB

  • memory/1216-6017-0x0000000076610000-0x000000007668A000-memory.dmp

    Filesize

    488KB

  • memory/1216-12762-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12764-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12763-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12765-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12767-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12768-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12769-0x00000000028C0000-0x00000000029C0000-memory.dmp

    Filesize

    1024KB

  • memory/1216-12770-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/1216-12771-0x00000000028C0000-0x00000000029C0000-memory.dmp

    Filesize

    1024KB