Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe
Resource
win10v2004-20231215-en
General
-
Target
86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe
-
Size
2.0MB
-
MD5
f961f54a56d9ff28b9f8371a732eea6c
-
SHA1
c09e39d9360fe8d39e3fe36e72b4f8135d475794
-
SHA256
86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89
-
SHA512
9c61426548686dfcffb3e0d03c68a52d02533b95509786cb67dd8eaa48722765ed7835005d05eb7d10ab061943ecbfc929ea09f9e4979efef07b7601d7049f85
-
SSDEEP
49152:LVQniGJepo2bkn04yHYoWFtCWBhO3zdyiiam:8iwepoiqXQtWbMJyi9m
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe 4700 86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe"C:\Users\Admin\AppData\Local\Temp\86eebacf320994e282caa5c75d9b5efcc89fec1ff676f03fdc24016a31baed89.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4700