Analysis

  • max time kernel
    172s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 03:54

General

  • Target

    3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe

  • Size

    2.0MB

  • MD5

    f55e55998f57d307563a682f0f0e3a49

  • SHA1

    4a7541559fd6edf0950ed485bffbca804e9b7cec

  • SHA256

    3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3

  • SHA512

    63b3bafef7322ec7df2045bf5abedd035f2c3e24bc556ac6eb30b3291bb10962082ddeb3562f092d138564c46ab8a3d1ae685a4986ff54f3fc76e436d183a349

  • SSDEEP

    49152:r/xYPn9RWJ7fMrW38+5/LZmW5nBJcVhKl0Vc0J:lYPwMrW38G/VmW9Y+q

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe
    "C:\Users\Admin\AppData\Local\Temp\3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 296
      2⤵
      • Program crash
      PID:1136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3720 -ip 3720
    1⤵
      PID:1616

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3720-0-0x0000000000400000-0x0000000000713000-memory.dmp

      Filesize

      3.1MB

    • memory/3720-1-0x0000000000400000-0x0000000000713000-memory.dmp

      Filesize

      3.1MB

    • memory/3720-2-0x0000000000400000-0x0000000000713000-memory.dmp

      Filesize

      3.1MB

    • memory/3720-3-0x0000000000400000-0x0000000000713000-memory.dmp

      Filesize

      3.1MB

    • memory/3720-4-0x00000000024F0000-0x00000000024F8000-memory.dmp

      Filesize

      32KB

    • memory/3720-5-0x0000000000400000-0x0000000000713000-memory.dmp

      Filesize

      3.1MB