Analysis
-
max time kernel
300s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe
Resource
win10-20240404-en
General
-
Target
3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe
-
Size
3.0MB
-
MD5
cd26ea5b17fe98a375ddfb645d9da46b
-
SHA1
9fb4c16c99cbb30e93aa338c01da54752d5c6fa5
-
SHA256
3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c
-
SHA512
9082dd9b0183be0e6d000f457dc457bbdd03be8bb86897f5c257afc61d3a3a713313aaf6b8815e517ba2bda52b60f1366d00c4403b6c23cc511c3d9b30ad0058
-
SSDEEP
49152:JECRjxCrm9u60kl9XCrmzempei3chLnl8VO5AJp6:mCJxC69/0GX7e/8VPJp
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4512 3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe"C:\Users\Admin\AppData\Local\Temp\3d4f14601b29fae585157887a3fc30dfa95f1e01b380ae9d2b6d7b0f8fbe7b1c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4512