Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 10:26

General

  • Target

    69c328646337c94cf88b1b40e87c28920420f7faec72fe80d7672d52a33492be.exe

  • Size

    816KB

  • MD5

    049310339dd65db8ac419786051e397b

  • SHA1

    0f11ca9500ae5733e342d9ba699de664e5006b49

  • SHA256

    69c328646337c94cf88b1b40e87c28920420f7faec72fe80d7672d52a33492be

  • SHA512

    06575ea3c87651a19141c77910ab009bd5e1bdbd21cda405ebba20d0474ecd4539b1701af9e98e8d1fdcf37fd59a8c9e74aef1cd7cf9ea1c838c8bf3a9963494

  • SSDEEP

    24576:JY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9R:m3XZynV4oDabuWbDQOcIxJJ9R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69c328646337c94cf88b1b40e87c28920420f7faec72fe80d7672d52a33492be.exe
    "C:\Users\Admin\AppData\Local\Temp\69c328646337c94cf88b1b40e87c28920420f7faec72fe80d7672d52a33492be.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\1D0F0D0D120C156E155F15F0A0D160A0B160C.exe
      C:\Users\Admin\AppData\Local\Temp\1D0F0D0D120C156E155F15F0A0D160A0B160C.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1D0F0D0D120C156E155F15F0A0D160A0B160C.exe

    Filesize

    816KB

    MD5

    297c8805c07c042c1742ffea05c767a6

    SHA1

    3775292a604281a77a8bc52530d8ee2b64781536

    SHA256

    11d91f694f684907c5f56669c0b565eedcb66de9f8f846ac3d578d689f075209

    SHA512

    6456dfe1998931e8228770597f1e7ffb9d6aac789ee84a234379a1b451e3406a1094dee9fbaab97e9a02cbd18aa374237ed173c7bb9990de0a14089261513ca4

  • C:\Users\Admin\AppData\Local\Temp\1D0F0D0D120C156E155F15F0A0D160A0B160C.exe

    Filesize

    816KB

    MD5

    297c8805c07c042c1742ffea05c767a6

    SHA1

    3775292a604281a77a8bc52530d8ee2b64781536

    SHA256

    11d91f694f684907c5f56669c0b565eedcb66de9f8f846ac3d578d689f075209

    SHA512

    6456dfe1998931e8228770597f1e7ffb9d6aac789ee84a234379a1b451e3406a1094dee9fbaab97e9a02cbd18aa374237ed173c7bb9990de0a14089261513ca4

  • memory/3640-9-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/3640-12-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/3640-11-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/4668-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/4668-2-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/4668-8-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB