Analysis

  • max time kernel
    2s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 01:29

General

  • Target

    489808110b6009b5422bb607b5481514.exe

  • Size

    30.4MB

  • MD5

    489808110b6009b5422bb607b5481514

  • SHA1

    84cbd464325fab631892d23287c5e57cb2d94e82

  • SHA256

    03708661678ba7ba0c196661b562fa158f7e4544a0578ab5e2e6f17cb552bc78

  • SHA512

    78478b04fd430a4c2f50bc7d6841277efb8e530377eecd5dbd111ca9a4021da828e9d7a2a5c38f1ce7fdc4e3738cfddcc8ae4ac601eca4df0995d191470282b4

  • SSDEEP

    786432:Xc22aTtEXMo9rg7rKRkJCnZGylekj5a6P3ZWnbBxp:s2D+X59TkJCnZGylekjE6P3ZWnbTp

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe
    "C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe
      "C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe" --type=renderer --enable-experimental-web-platform-features --no-sandbox --lang=en-US --nodejs --working-directory="C:\Users\Admin\AppData\Local\Temp" --disable-webgl --disable-pepper-3d --disable-gl-multisampling --disable-accelerated-compositing --disable-accelerated-2d-canvas --disable-accelerated-video-decode --channel="1684.0.223517357\1361707467" /prefetch:673131151
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of SetWindowsHookEx
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\users\admin\appdata\local\temp\00000000

    Filesize

    14B

    MD5

    3efffdc73d772bc5cc39dde18af858c3

    SHA1

    23bf8134da02defbb118a9ebbbd65e023d9ca29f

    SHA256

    0e4667af2cae3eb06b95eef051b5584f9c1bfc58e9c82fd8008cc748e09d89ab

    SHA512

    c7bf8091500972f6dc19c56b830979512353be7fd8468277ccadf312c6378134c7282454376cb86885e90bb92c87c3d7f3ceed559a2cc64b7646617c9c486543

  • memory/1684-3-0x0000000001110000-0x00000000040E0000-memory.dmp

    Filesize

    47.8MB

  • memory/1684-4-0x0000000077830000-0x0000000077831000-memory.dmp

    Filesize

    4KB

  • memory/1684-5-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/1684-10-0x000000004AD00000-0x000000004B681000-memory.dmp

    Filesize

    9.5MB

  • memory/1684-13-0x00000000067B0000-0x0000000006B81000-memory.dmp

    Filesize

    3.8MB

  • memory/1684-15-0x0000000005830000-0x0000000005831000-memory.dmp

    Filesize

    4KB

  • memory/1684-20-0x000000000B320000-0x000000000E2F0000-memory.dmp

    Filesize

    47.8MB

  • memory/1684-48-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/1684-47-0x0000000001110000-0x00000000040E0000-memory.dmp

    Filesize

    47.8MB

  • memory/2676-37-0x000000003D700000-0x000000003D701000-memory.dmp

    Filesize

    4KB

  • memory/2676-36-0x0000000027300000-0x0000000027301000-memory.dmp

    Filesize

    4KB

  • memory/2676-35-0x0000000016F00000-0x0000000016F01000-memory.dmp

    Filesize

    4KB

  • memory/2676-34-0x0000000016B00000-0x0000000016B01000-memory.dmp

    Filesize

    4KB

  • memory/2676-38-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB

  • memory/2676-33-0x000000002DC00000-0x000000002DC01000-memory.dmp

    Filesize

    4KB

  • memory/2676-32-0x0000000035C00000-0x0000000035C01000-memory.dmp

    Filesize

    4KB

  • memory/2676-45-0x0000000001110000-0x00000000040E0000-memory.dmp

    Filesize

    47.8MB

  • memory/2676-25-0x00000000FFBD0000-0x00000000FFFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2676-23-0x0000000001110000-0x00000000040E0000-memory.dmp

    Filesize

    47.8MB