Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 16:15

General

  • Target

    7bef22c1744ded32f0dca4e223f7399f.exe

  • Size

    597KB

  • MD5

    7bef22c1744ded32f0dca4e223f7399f

  • SHA1

    1b7333dcfa21e9c822ea347685db75b8801852c3

  • SHA256

    120408adedb6813aa406d5d0e60061e38ecfe07c583925b2141d842cb56514c6

  • SHA512

    6ba1c336c8efa04f3f0c42e60e2119158d82aeb93018eb03b9aeb9fb3dacab78f8bd953e15e7b686f94a2d6157c17247016fa194280656d89be2006898663ad0

  • SSDEEP

    12288:U8MH1DyQyQ0YGs1tzxcAveyL3SjDOt3peNU72gBgzg+aSYuP8:LMH1DyZQ0av2PCC42gBgzg+aSYK8

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bef22c1744ded32f0dca4e223f7399f.exe
    "C:\Users\Admin\AppData\Local\Temp\7bef22c1744ded32f0dca4e223f7399f.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2224

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2224-0-0x0000000000400000-0x000000000049B000-memory.dmp

          Filesize

          620KB

        • memory/2224-1-0x0000000000400000-0x000000000049B000-memory.dmp

          Filesize

          620KB

        • memory/2224-2-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB

        • memory/2224-3-0x0000000000400000-0x000000000049B000-memory.dmp

          Filesize

          620KB

        • memory/2224-4-0x0000000000330000-0x0000000000331000-memory.dmp

          Filesize

          4KB

        • memory/2224-5-0x0000000000400000-0x000000000049B000-memory.dmp

          Filesize

          620KB