Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2023 11:36

General

  • Target

    2ddde756e40d81603ad9efa5c66c11f204f310d5be99a7f7fc9d918b742ffa9d.exe

  • Size

    12.0MB

  • MD5

    46cada3f6a44380fb25ece75da0d0928

  • SHA1

    5c9ba523e8bec5c2ac9078df63d7f81babe223cf

  • SHA256

    2ddde756e40d81603ad9efa5c66c11f204f310d5be99a7f7fc9d918b742ffa9d

  • SHA512

    ab072be91e4aa189497c1448cba136273afa0d76e4024ab57ab859b0d47935127883064f00dc34218c351ed84238c833601c625ea3065fec1f3b4de21005f560

  • SSDEEP

    196608:0fU3R4DCLMaMLJK6MhpW0KbQ2yqcJVSlMpV3O:0fU3R4DmMLojp3K5miip1O

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ddde756e40d81603ad9efa5c66c11f204f310d5be99a7f7fc9d918b742ffa9d.exe
    "C:\Users\Admin\AppData\Local\Temp\2ddde756e40d81603ad9efa5c66c11f204f310d5be99a7f7fc9d918b742ffa9d.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1508

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1508-0-0x0000000000400000-0x0000000001000000-memory.dmp

    Filesize

    12.0MB

  • memory/1508-1-0x0000000077280000-0x0000000077495000-memory.dmp

    Filesize

    2.1MB

  • memory/1508-3875-0x0000000075D40000-0x0000000075EE0000-memory.dmp

    Filesize

    1.6MB

  • memory/1508-5884-0x0000000075A50000-0x0000000075ACA000-memory.dmp

    Filesize

    488KB

  • memory/1508-13069-0x00000000040D0000-0x00000000040D1000-memory.dmp

    Filesize

    4KB

  • memory/1508-13070-0x00000000040E0000-0x00000000040E1000-memory.dmp

    Filesize

    4KB

  • memory/1508-13071-0x0000000004100000-0x0000000004101000-memory.dmp

    Filesize

    4KB

  • memory/1508-13072-0x00000000040F0000-0x00000000040F1000-memory.dmp

    Filesize

    4KB

  • memory/1508-13085-0x0000000000400000-0x0000000001000000-memory.dmp

    Filesize

    12.0MB