Malware Analysis Report

2025-08-05 15:36

Sample ID 240526-nxjdcshd3w
Target 87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29
SHA256 87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29
Tags
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29

Threat Level: Likely benign

The file 87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29 was found to be: Likely benign.

Malicious Activity Summary


Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-26 11:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-26 11:46

Reported

2024-05-27 12:14

Platform

win10v2004-20240426-en

Max time kernel

91s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe

"C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 udp
N/A 52.111.227.11:443 tcp

Files

memory/3544-0-0x000000000099F000-0x0000000000CF6000-memory.dmp

memory/3544-4-0x0000000001910000-0x0000000001911000-memory.dmp

memory/3544-6-0x0000000001930000-0x0000000001931000-memory.dmp

memory/3544-5-0x0000000001920000-0x0000000001921000-memory.dmp

memory/3544-3-0x00000000018E0000-0x00000000018E1000-memory.dmp

memory/3544-2-0x0000000001540000-0x0000000001541000-memory.dmp

memory/3544-1-0x0000000000400000-0x000000000144C000-memory.dmp

memory/3544-9-0x0000000001960000-0x0000000001961000-memory.dmp

memory/3544-8-0x0000000001950000-0x0000000001951000-memory.dmp

memory/3544-7-0x0000000001940000-0x0000000001941000-memory.dmp

memory/3544-13-0x0000000000400000-0x000000000144C000-memory.dmp

memory/3544-14-0x000000000099F000-0x0000000000CF6000-memory.dmp

memory/3544-15-0x0000000000400000-0x000000000144C000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-26 11:46

Reported

2024-05-26 11:49

Platform

win7-20240221-en

Max time kernel

120s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe

"C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe"

Network

N/A

Files

memory/1284-40-0x0000000000340000-0x0000000000341000-memory.dmp

memory/1284-38-0x0000000000340000-0x0000000000341000-memory.dmp

memory/1284-36-0x0000000000340000-0x0000000000341000-memory.dmp

memory/1284-35-0x0000000000400000-0x000000000144C000-memory.dmp

memory/1284-34-0x0000000000330000-0x0000000000331000-memory.dmp

memory/1284-32-0x0000000000330000-0x0000000000331000-memory.dmp

memory/1284-30-0x0000000000330000-0x0000000000331000-memory.dmp

memory/1284-29-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1284-27-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1284-24-0x0000000000310000-0x0000000000311000-memory.dmp

memory/1284-22-0x0000000000310000-0x0000000000311000-memory.dmp

memory/1284-19-0x0000000000280000-0x0000000000281000-memory.dmp

memory/1284-17-0x0000000000280000-0x0000000000281000-memory.dmp

memory/1284-14-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1284-12-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1284-9-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1284-7-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1284-5-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1284-4-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1284-2-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1284-0-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1284-45-0x0000000000400000-0x000000000144C000-memory.dmp

memory/1284-44-0x0000000000400000-0x000000000144C000-memory.dmp

memory/1284-46-0x0000000000400000-0x000000000144C000-memory.dmp