Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 06:22

General

  • Target

    f70f770d366cdef6f4ffc35f8c595fc5e4308354d820b456f1d4a65da8451e93.exe

  • Size

    10.4MB

  • MD5

    4f6ccde10891fb14eff91ae0465bbfb5

  • SHA1

    5e47ad198325ece256a506b7130d9cd9f1ef35fa

  • SHA256

    f70f770d366cdef6f4ffc35f8c595fc5e4308354d820b456f1d4a65da8451e93

  • SHA512

    806a27bd8e60929ab8142fcf1f0c980e9da3fd62e3a76fe913fd6973eacd23bb7a6fa196ccb1953175d78976daaad63e7906603cb2a6bdd78c3d2fa9713d586b

  • SSDEEP

    196608:0ys8eY9uS+dFrXN42CmQSawWWPVOzbJQoG4t0gtw:0yr9uSOr9dCmQAO3tG4tp

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f70f770d366cdef6f4ffc35f8c595fc5e4308354d820b456f1d4a65da8451e93.exe
    "C:\Users\Admin\AppData\Local\Temp\f70f770d366cdef6f4ffc35f8c595fc5e4308354d820b456f1d4a65da8451e93.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2292-0-0x0000000000400000-0x0000000001C5D000-memory.dmp

    Filesize

    24.4MB

  • memory/2292-1-0x000000007575E000-0x000000007575F000-memory.dmp

    Filesize

    4KB

  • memory/2292-3-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-2-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-4-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-5-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-6-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-8-0x0000000010000000-0x000000001033A000-memory.dmp

    Filesize

    3.2MB

  • memory/2292-17-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-23-0x0000000010000000-0x000000001033A000-memory.dmp

    Filesize

    3.2MB

  • memory/2292-22-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2292-20-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2292-18-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2292-25-0x0000000000400000-0x0000000001C5D000-memory.dmp

    Filesize

    24.4MB

  • memory/2292-26-0x0000000075750000-0x0000000075797000-memory.dmp

    Filesize

    284KB

  • memory/2292-27-0x000000007575E000-0x000000007575F000-memory.dmp

    Filesize

    4KB

  • memory/2292-29-0x0000000000400000-0x0000000001C5D000-memory.dmp

    Filesize

    24.4MB