Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 03:54

General

  • Target

    58f7cde91272a7fbdeb5fc9602e72020a14f2ab34e2852d6e0c26bed0d11750d.exe

  • Size

    5.7MB

  • MD5

    1a1a70260b3f373c1e8f2e1474554123

  • SHA1

    cc799580ba6506b96623007b4a1140f3a7b5dc7b

  • SHA256

    58f7cde91272a7fbdeb5fc9602e72020a14f2ab34e2852d6e0c26bed0d11750d

  • SHA512

    1a7391196082dea908cda28de53003497d32fecc8cf4d8e89c421c51a372660ced5496dcfea76c28f22becc04b7a4fe0b91fc8bcdd2ad6c692a4cc862b392d0f

  • SSDEEP

    98304:XU5wWj5OjgCgduG0vrYSYLUt9pKA1F2DOooC2EaZeyQ9DGVHOxK/2FBucyKDUk:XUGWjIjgCaUsSpoAFUPoLErNYOvF8Kt

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58f7cde91272a7fbdeb5fc9602e72020a14f2ab34e2852d6e0c26bed0d11750d.exe
    "C:\Users\Admin\AppData\Local\Temp\58f7cde91272a7fbdeb5fc9602e72020a14f2ab34e2852d6e0c26bed0d11750d.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:1364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1364-0-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-1-0x0000000076C90000-0x0000000076EA5000-memory.dmp

    Filesize

    2.1MB

  • memory/1364-3875-0x0000000075B10000-0x0000000075CB0000-memory.dmp

    Filesize

    1.6MB

  • memory/1364-5884-0x0000000076320000-0x000000007639A000-memory.dmp

    Filesize

    488KB

  • memory/1364-13069-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13070-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13071-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13072-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13074-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13075-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13076-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB

  • memory/1364-13077-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB

  • memory/1364-13078-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13080-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB

  • memory/1364-13079-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB

  • memory/1364-13083-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13084-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13089-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB

  • memory/1364-13090-0x0000000000400000-0x0000000000F55000-memory.dmp

    Filesize

    11.3MB