Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 08:12
Static task
static1
Behavioral task
behavioral1
Sample
11344325b0e0126f35b170fc2fbaa4bc.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
11344325b0e0126f35b170fc2fbaa4bc.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
11344325b0e0126f35b170fc2fbaa4bc.exe
-
Size
606KB
-
MD5
11344325b0e0126f35b170fc2fbaa4bc
-
SHA1
2170ede9f08ef2abf1d669b8bc5d8c978aaa1b4d
-
SHA256
10a176f12611bbbf211c82cf674883527f981028e12234b82819073b1244d95b
-
SHA512
e5382a4f8ef9392b8f6abbf5feec517e943b2d804d87fe0bced87943f7fbd02d6350f760ee3c990e4433219fab2f41ffd33b604f0d3f7d8d55bb8afb2fcc2b68
-
SSDEEP
12288:v7vgHZvpwJWlYI3u4uy/ouC8SLneo6NjMrk:Lg5xU23u4UgSzZ6ik
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 3284 11344325b0e0126f35b170fc2fbaa4bc.exe 2144 11344325b0e0126f35b170fc2fbaa4bc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3284 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 92 PID 1172 wrote to memory of 3284 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 92 PID 1172 wrote to memory of 3284 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 92 PID 1172 wrote to memory of 2144 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 91 PID 1172 wrote to memory of 2144 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 91 PID 1172 wrote to memory of 2144 1172 11344325b0e0126f35b170fc2fbaa4bc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exe"C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exewatch2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exestart2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3284
-