Analysis

  • max time kernel
    144s
  • max time network
    274s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 18:16

General

  • Target

    FL64.exe

  • Size

    2.9MB

  • MD5

    3ca6520c75713fe3a4871a8c5be4c2da

  • SHA1

    d7175a6d9d580b38b76e55fe41dd2c0dac5ae185

  • SHA256

    99c11dcae1886c8a6cd79000f3a58b86f11e904f8552b95b5f4598d9aa6e98e8

  • SHA512

    6586dfa3b60c70f5894116aae1240c36a780c5d79b864e95d717f0931e8f2a0f109ff4f5b7c9b3d67f3c18dee629cd482beda87becd7401dbb668e4e23c2c8fb

  • SSDEEP

    49152:rbQUGvbm3zQVV95iEOvjDc1kjPc8aqj/2YjXvcL/2NXydBbszpozS/EADO:AUEbm6V95RQjDpjVLj/TXySp6HMO

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FL64.exe
    "C:\Users\Admin\AppData\Local\Temp\FL64.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4512-0-0x00007FFBC9A10000-0x00007FFBC9A12000-memory.dmp

    Filesize

    8KB

  • memory/4512-1-0x000000005BF30000-0x000000005FFB7000-memory.dmp

    Filesize

    64.5MB

  • memory/4512-2-0x000000005FB37000-0x000000005FBCA000-memory.dmp

    Filesize

    588KB

  • memory/4512-3-0x000000005BF30000-0x000000005FFB7000-memory.dmp

    Filesize

    64.5MB