Analysis

  • max time kernel
    155s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 08:43

General

  • Target

    0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe

  • Size

    812KB

  • MD5

    002794162026df5f668c2314713aa656

  • SHA1

    02722f1c46e9b1e532e24972527b6e002cf7f609

  • SHA256

    0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac

  • SHA512

    79c0a67309472b8dcef4061ae1abb33fec6013462df71b81d0d7fefce40d4978b55ba8ae53b580da56ddc37f584c71d7307b7ed16e178865d09a152c3757146a

  • SSDEEP

    12288:oqmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:oqxtVfNDb31oT41+aneOrO4p2zMOZ/V

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe
    "C:\Users\Admin\AppData\Local\Temp\0d44b804375efec87d2c404fec68ba4e7eb30671cfb71198111e6f5f3da201ac.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\1E0A0D0A120A156D155B15C0A0C160E0A160D.exe
      C:\Users\Admin\AppData\Local\Temp\1E0A0D0A120A156D155B15C0A0C160E0A160D.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3768

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1E0A0D0A120A156D155B15C0A0C160E0A160D.exe

          Filesize

          812KB

          MD5

          7689b1216dfc11c48d8fd41eb46da647

          SHA1

          0afb2940cb40f8af01148e65425dc4134a790992

          SHA256

          1142dbf9be35e8f6fad0dbb28e209fb0b5801d9b6dd84c559f8cf528f09cbc85

          SHA512

          574236c86340d346c451079c78af259133de5a571e83757d8d46824a154dca7dda1760612b39723a2fac9e025ff1406c5850912e6ddbe9cce764f5e962f5c004

        • C:\Users\Admin\AppData\Local\Temp\1E0A0D0A120A156D155B15C0A0C160E0A160D.exe

          Filesize

          812KB

          MD5

          7689b1216dfc11c48d8fd41eb46da647

          SHA1

          0afb2940cb40f8af01148e65425dc4134a790992

          SHA256

          1142dbf9be35e8f6fad0dbb28e209fb0b5801d9b6dd84c559f8cf528f09cbc85

          SHA512

          574236c86340d346c451079c78af259133de5a571e83757d8d46824a154dca7dda1760612b39723a2fac9e025ff1406c5850912e6ddbe9cce764f5e962f5c004

        • memory/2700-0-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/2700-2-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/2700-9-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/3768-7-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/3768-10-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/3768-11-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB

        • memory/3768-12-0x0000000000400000-0x00000000005AB000-memory.dmp

          Filesize

          1.7MB