Analysis Overview
SHA256
202ecdd3d57ba69a070c9d3448d56019981e14c14e05b3f3a788021f5f7570d2
Threat Level: Known bad
The file 751bc7284282d568166cd73f6dfdb44b was found to be: Known bad.
Malicious Activity Summary
Kinsing
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-01-25 17:35
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-25 17:35
Reported
2024-01-25 17:38
Platform
win7-20231215-en
Max time kernel
120s
Max time network
121s
Command Line
Signatures
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe
"C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe"
C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe
watch
C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe
start
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | forces.megafilemaster.ru | udp |
Files
memory/2436-1-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2436-0-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2436-2-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2436-3-0x0000000000270000-0x0000000000271000-memory.dmp
memory/2436-7-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2460-6-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2448-8-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2448-5-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2460-9-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2448-10-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2448-14-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2460-13-0x0000000000300000-0x0000000000301000-memory.dmp
memory/2460-11-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2460-12-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2448-15-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2460-16-0x0000000000400000-0x000000000049A000-memory.dmp
memory/2436-17-0x0000000000400000-0x000000000049A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-25 17:35
Reported
2024-01-25 17:38
Platform
win10v2004-20231215-en
Max time kernel
92s
Max time network
150s
Command Line
Signatures
Kinsing
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe
"C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe"
C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe
watch
C:\Users\Admin\AppData\Local\Temp\751bc7284282d568166cd73f6dfdb44b.exe
start
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | forces.megafilemaster.ru | udp |
| US | 8.8.8.8:53 | 178.113.50.184.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | forces.megafilemaster.ru | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.160.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 173.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
Files
memory/4376-0-0x0000000000400000-0x000000000049A000-memory.dmp
memory/4376-1-0x0000000000400000-0x000000000049A000-memory.dmp
memory/4376-2-0x0000000000400000-0x000000000049A000-memory.dmp
memory/5024-5-0x0000000000400000-0x000000000049A000-memory.dmp
memory/3992-7-0x0000000000400000-0x000000000049A000-memory.dmp
memory/4376-4-0x0000000000400000-0x000000000049A000-memory.dmp
memory/4376-8-0x0000000002240000-0x0000000002241000-memory.dmp
memory/4376-3-0x0000000000650000-0x0000000000651000-memory.dmp
memory/3992-9-0x0000000000400000-0x000000000049A000-memory.dmp
memory/3992-10-0x0000000000400000-0x000000000049A000-memory.dmp
memory/5024-12-0x0000000000400000-0x000000000049A000-memory.dmp
memory/3992-14-0x0000000000400000-0x000000000049A000-memory.dmp
memory/5024-13-0x0000000002100000-0x0000000002101000-memory.dmp
memory/5024-11-0x0000000000400000-0x000000000049A000-memory.dmp
memory/3992-15-0x0000000000400000-0x000000000049A000-memory.dmp
memory/5024-16-0x0000000000400000-0x000000000049A000-memory.dmp