Analysis

  • max time kernel
    153s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 15:47

General

  • Target

    68aa3e720e8acf3cbd64f4046d067c50e53426ad0a2e738d08618c7aff116073_JC.exe

  • Size

    6.0MB

  • MD5

    034dfb2a7a6be34ff4c197c3f5158c4e

  • SHA1

    f7805977f7cef6bd9b6fccf0f0a144626a838fde

  • SHA256

    68aa3e720e8acf3cbd64f4046d067c50e53426ad0a2e738d08618c7aff116073

  • SHA512

    73d5b8f20f26573a19f7d202828a7401ab654c14361e05f2020d3ef3b0b09276546b9f3c72756ea6a4d81a08a7608d0c07b47f3ac767dafeeb133105d8488081

  • SSDEEP

    98304:sB6Xdvo120oIeVsHteuyK8mCpq3wdqVAYUzujDG:pC8VFTd4AoVAYUzT

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68aa3e720e8acf3cbd64f4046d067c50e53426ad0a2e738d08618c7aff116073_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\68aa3e720e8acf3cbd64f4046d067c50e53426ad0a2e738d08618c7aff116073_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4032-0-0x00007FF7D8E40000-0x00007FF7D97C5000-memory.dmp

    Filesize

    9.5MB

  • memory/4032-1-0x00007FFD2B130000-0x00007FFD2B132000-memory.dmp

    Filesize

    8KB

  • memory/4032-2-0x00007FFD2B140000-0x00007FFD2B142000-memory.dmp

    Filesize

    8KB

  • memory/4032-4-0x00007FF7D8E40000-0x00007FF7D97C5000-memory.dmp

    Filesize

    9.5MB

  • memory/4032-5-0x00007FF7D8E40000-0x00007FF7D97C5000-memory.dmp

    Filesize

    9.5MB