Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 18:42

General

  • Target

    loader_v2.exe

  • Size

    40.4MB

  • MD5

    810dcdc15e1fb911e969b8cb46984d68

  • SHA1

    3a339bc0bb32444ca0699ea460a8e92c795aadf7

  • SHA256

    3ca42102d0acf62a0de328c9521bd703795b5b7b9545e24655dd788b1848efc8

  • SHA512

    b6b3c8c0500a6674b9b7e45f51764300a9571b17070ce52103277f97c47646f20fab3044a9063061c18aa1ddef215831cf31abe7fefc63cc423cf0a9d2244bc6

  • SSDEEP

    786432:uQRkAREzvd7zQzmxWk85FVJ6gdO9AxcwZmH8twmwa/ddxqyOMbt:dJEbdXQzmMRJ6gwJH8tSCddAMb

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader_v2.exe
    "C:\Users\Admin\AppData\Local\Temp\loader_v2.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3668

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3668-0-0x00007FFF21B90000-0x00007FFF21B92000-memory.dmp

    Filesize

    8KB

  • memory/3668-1-0x00007FFF21BA0000-0x00007FFF21BA2000-memory.dmp

    Filesize

    8KB

  • memory/3668-2-0x0000000140000000-0x0000000141000000-memory.dmp

    Filesize

    16.0MB