Resubmissions

27-04-2024 22:30

240427-2faxjsac8z 10

27-04-2024 22:14

240427-15m3qshf69 10

Analysis

  • max time kernel
    251s
  • max time network
    261s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-04-2024 22:30

General

  • Target

    immortal.bin.exe

  • Size

    1.1MB

  • MD5

    9e511d399fbc2bf0c2d45302dc62be61

  • SHA1

    3100c1c0c5f98b1a7bccef0cdcfde6b34e38992b

  • SHA256

    ce8f179e7e29d4f28f1c5039808e82c198264183166069d8ad567f63275c74a8

  • SHA512

    7e4560bd6e76d181b47f44eca0a7195cb905e852ed2a94308cad57576a16c62335256978c73ddac275d736423c5c6a9a4eed648090847ee80e8183be77c04486

  • SSDEEP

    24576:fO29aTBMPYvJnXAvKhO7CMbNdCrty7ARVJ3g6cbhbZxvI:G29adQt3CrtWQcb3xv

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\immortal.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\immortal.bin.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 1572
      2⤵
      • Program crash
      PID:1420
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3876 -ip 3876
    1⤵
      PID:2600

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3876-0-0x0000000000950000-0x0000000000CBE000-memory.dmp

      Filesize

      3.4MB

    • memory/3876-1-0x0000000000950000-0x0000000000CBE000-memory.dmp

      Filesize

      3.4MB

    • memory/3876-2-0x00000000745B0000-0x0000000074D61000-memory.dmp

      Filesize

      7.7MB

    • memory/3876-3-0x0000000005D80000-0x0000000005D90000-memory.dmp

      Filesize

      64KB

    • memory/3876-6-0x0000000000950000-0x0000000000CBE000-memory.dmp

      Filesize

      3.4MB

    • memory/3876-7-0x00000000745B0000-0x0000000074D61000-memory.dmp

      Filesize

      7.7MB