Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2023, 20:37

General

  • Target

    cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe

  • Size

    812KB

  • MD5

    96d140cbecfc9859ebf9888b1eef0f4c

  • SHA1

    a212066f78fe54a5f6f289bd5cbaebe312269637

  • SHA256

    cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0

  • SHA512

    6d4240d24398475ec6b641d5de67260f5f6075463a07bc2913ab1b6b3abd578a532fdd632ce75aea336ea73eef4898bfedc147aa819005d43cff34c3553e6fdd

  • SSDEEP

    12288:5qmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:5qxtVfNDb31oT41+aneOrO4p2zMOZ/V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe
    "C:\Users\Admin\AppData\Local\Temp\cf6e51a1a12c6e111e6b6ce14157e7982c3ad084ded27525d2d0e39eed15acb0.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\AppData\Local\Temp\1F0F0D0B120F156B155C15A0C0E160A0D160A.exe
      C:\Users\Admin\AppData\Local\Temp\1F0F0D0B120F156B155C15A0C0E160A0D160A.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1892

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1F0F0D0B120F156B155C15A0C0E160A0D160A.exe

          Filesize

          812KB

          MD5

          a1db4e7044820bd89330a33982eb9073

          SHA1

          9b9f184f2984b5d64d804b71ec2c0329dc4e4ed2

          SHA256

          a7f9da41edf82fc2f6ea72dbb5f262a1c8bf58417d942684faee4e0ff25497d9

          SHA512

          41d6c4bfb76ae42ee32ebcf4f6fe124af9a86260fe46829b1f91b1da2d48219b2369079f03039f6f0e63e371b41ace281216fda3f87019d12c6237a484c6cc68

        • C:\Users\Admin\AppData\Local\Temp\1F0F0D0B120F156B155C15A0C0E160A0D160A.exe

          Filesize

          812KB

          MD5

          a1db4e7044820bd89330a33982eb9073

          SHA1

          9b9f184f2984b5d64d804b71ec2c0329dc4e4ed2

          SHA256

          a7f9da41edf82fc2f6ea72dbb5f262a1c8bf58417d942684faee4e0ff25497d9

          SHA512

          41d6c4bfb76ae42ee32ebcf4f6fe124af9a86260fe46829b1f91b1da2d48219b2369079f03039f6f0e63e371b41ace281216fda3f87019d12c6237a484c6cc68

        • memory/1892-11-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/1892-12-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/1892-8-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/4472-0-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/4472-1-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/4472-2-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/4472-9-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB