Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:18

General

  • Target

    a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe

  • Size

    816KB

  • MD5

    13b55cb6496fc371330edd5222ce4a7d

  • SHA1

    964f7a4e8559e358c689e218018c3c7dc135eb35

  • SHA256

    a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199

  • SHA512

    5520e6b100062b3f2cc9bcffeeaf4c6af7fe5c891d211d625a0d1e858e53f04426ae4953e553af18abdc995664d80fb6cf9e5e54287d1a51fb589d342610fe44

  • SSDEEP

    24576:aY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9O:T3XZynV4oDabuWbDQOcIxJJ9O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe
    "C:\Users\Admin\AppData\Local\Temp\a2abcef58ca4622cd63b220887be0659e69ff0d517c131205ac426b7f1083199.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\1E0E0C0C120F156D155A15D0F0F160F0C160E.exe
      C:\Users\Admin\AppData\Local\Temp\1E0E0C0C120F156D155A15D0F0F160F0C160E.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:4024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1E0E0C0C120F156D155A15D0F0F160F0C160E.exe

    Filesize

    816KB

    MD5

    26112e62673bba5ce3c7aab7d1b00a8a

    SHA1

    4a8c93cd69a6fdb37c6e6c3c1e0f286c735e6fd7

    SHA256

    88bb6e7ec19e502212070fef695ad4b98169915794bd1c7f858a5e03d7cb5e20

    SHA512

    2962491c348f8afe4b6f3b5bf2212357407a474ba7cc5f9a7ae9660bcbfe087454490463fb927d4362684669ddaeb0f465649760d1d98d98e77555727aa0d38b

  • memory/1636-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1636-9-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1636-2-0x0000000000401000-0x000000000041F000-memory.dmp

    Filesize

    120KB

  • memory/1636-1-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/4024-12-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/4024-11-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/4024-8-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB