Analysis

  • max time kernel
    7s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 01:29

General

  • Target

    489808110b6009b5422bb607b5481514.exe

  • Size

    30.4MB

  • MD5

    489808110b6009b5422bb607b5481514

  • SHA1

    84cbd464325fab631892d23287c5e57cb2d94e82

  • SHA256

    03708661678ba7ba0c196661b562fa158f7e4544a0578ab5e2e6f17cb552bc78

  • SHA512

    78478b04fd430a4c2f50bc7d6841277efb8e530377eecd5dbd111ca9a4021da828e9d7a2a5c38f1ce7fdc4e3738cfddcc8ae4ac601eca4df0995d191470282b4

  • SSDEEP

    786432:Xc22aTtEXMo9rg7rKRkJCnZGylekj5a6P3ZWnbBxp:s2D+X59TkJCnZGylekjE6P3ZWnbTp

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe
    "C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe
      "C:\Users\Admin\AppData\Local\Temp\489808110b6009b5422bb607b5481514.exe" --type=renderer --enable-experimental-web-platform-features --no-sandbox --lang=en-US --nodejs --working-directory="C:\Users\Admin\AppData\Local\Temp" --disable-webgl --disable-pepper-3d --disable-gl-multisampling --disable-accelerated-compositing --disable-accelerated-2d-canvas --disable-accelerated-video-decode --channel="2856.0.1194232724\56454529" /prefetch:673131151
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\users\admin\appdata\local\temp\00000000

    Filesize

    14B

    MD5

    7710eb70b8c32437dd1cf0321874063d

    SHA1

    faff32cba23cc305bec56890a68f98174b9feac6

    SHA256

    00f922760b6a98bc38f2c92607700eb28122d8f7ce6ffae18c8ab2b33610f8a1

    SHA512

    1854675aa991c71430c92774b5e5de4970f71a2515842075cf2f9f4e621a8445a795aa268a5ad11c9dcfacd13280f4aefc5678aa71f3524354416db321508974

  • memory/2856-0-0x00000000001F0000-0x00000000031C0000-memory.dmp

    Filesize

    47.8MB

  • memory/2856-1-0x00000000FF520000-0x00000000FF8F1000-memory.dmp

    Filesize

    3.8MB

  • memory/2856-3-0x0000000077643000-0x0000000077644000-memory.dmp

    Filesize

    4KB

  • memory/2856-2-0x0000000077642000-0x0000000077643000-memory.dmp

    Filesize

    4KB

  • memory/2856-11-0x000000004AD00000-0x000000004B681000-memory.dmp

    Filesize

    9.5MB

  • memory/2856-14-0x0000000006E00000-0x00000000071D1000-memory.dmp

    Filesize

    3.8MB

  • memory/2856-16-0x000000000A110000-0x000000000A111000-memory.dmp

    Filesize

    4KB

  • memory/2856-54-0x00000000FF520000-0x00000000FF8F1000-memory.dmp

    Filesize

    3.8MB

  • memory/2856-53-0x00000000001F0000-0x00000000031C0000-memory.dmp

    Filesize

    47.8MB

  • memory/4980-37-0x000000002D800000-0x000000002D801000-memory.dmp

    Filesize

    4KB

  • memory/4980-36-0x0000000027400000-0x0000000027401000-memory.dmp

    Filesize

    4KB

  • memory/4980-35-0x000000003E200000-0x000000003E201000-memory.dmp

    Filesize

    4KB

  • memory/4980-34-0x000000002E500000-0x000000002E501000-memory.dmp

    Filesize

    4KB

  • memory/4980-33-0x0000000034500000-0x0000000034501000-memory.dmp

    Filesize

    4KB

  • memory/4980-32-0x000000001E100000-0x000000001E101000-memory.dmp

    Filesize

    4KB

  • memory/4980-38-0x00000000FF760000-0x00000000FF784000-memory.dmp

    Filesize

    144KB

  • memory/4980-45-0x00000000FF760000-0x00000000FF784000-memory.dmp

    Filesize

    144KB

  • memory/4980-51-0x00000000FF790000-0x00000000FFB61000-memory.dmp

    Filesize

    3.8MB

  • memory/4980-50-0x00000000001F0000-0x00000000031C0000-memory.dmp

    Filesize

    47.8MB

  • memory/4980-22-0x00000000FF790000-0x00000000FFB61000-memory.dmp

    Filesize

    3.8MB

  • memory/4980-21-0x00000000001F0000-0x00000000031C0000-memory.dmp

    Filesize

    47.8MB