Analysis Overview
SHA256
87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29
Threat Level: Likely benign
The file 87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29 was found to be: Likely benign.
Malicious Activity Summary
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-26 11:46
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-26 11:46
Reported
2024-05-27 12:14
Platform
win10v2004-20240426-en
Max time kernel
91s
Max time network
94s
Command Line
Signatures
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe
"C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp | |
| N/A | 52.111.227.11:443 | tcp |
Files
memory/3544-0-0x000000000099F000-0x0000000000CF6000-memory.dmp
memory/3544-4-0x0000000001910000-0x0000000001911000-memory.dmp
memory/3544-6-0x0000000001930000-0x0000000001931000-memory.dmp
memory/3544-5-0x0000000001920000-0x0000000001921000-memory.dmp
memory/3544-3-0x00000000018E0000-0x00000000018E1000-memory.dmp
memory/3544-2-0x0000000001540000-0x0000000001541000-memory.dmp
memory/3544-1-0x0000000000400000-0x000000000144C000-memory.dmp
memory/3544-9-0x0000000001960000-0x0000000001961000-memory.dmp
memory/3544-8-0x0000000001950000-0x0000000001951000-memory.dmp
memory/3544-7-0x0000000001940000-0x0000000001941000-memory.dmp
memory/3544-13-0x0000000000400000-0x000000000144C000-memory.dmp
memory/3544-14-0x000000000099F000-0x0000000000CF6000-memory.dmp
memory/3544-15-0x0000000000400000-0x000000000144C000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-26 11:46
Reported
2024-05-26 11:49
Platform
win7-20240221-en
Max time kernel
120s
Max time network
127s
Command Line
Signatures
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe
"C:\Users\Admin\AppData\Local\Temp\87a5a5ca2c971388c7d0a140350ab5ffc48190d2b7e527a2e8fab4803664bd29.exe"
Network
Files
memory/1284-40-0x0000000000340000-0x0000000000341000-memory.dmp
memory/1284-38-0x0000000000340000-0x0000000000341000-memory.dmp
memory/1284-36-0x0000000000340000-0x0000000000341000-memory.dmp
memory/1284-35-0x0000000000400000-0x000000000144C000-memory.dmp
memory/1284-34-0x0000000000330000-0x0000000000331000-memory.dmp
memory/1284-32-0x0000000000330000-0x0000000000331000-memory.dmp
memory/1284-30-0x0000000000330000-0x0000000000331000-memory.dmp
memory/1284-29-0x0000000000320000-0x0000000000321000-memory.dmp
memory/1284-27-0x0000000000320000-0x0000000000321000-memory.dmp
memory/1284-24-0x0000000000310000-0x0000000000311000-memory.dmp
memory/1284-22-0x0000000000310000-0x0000000000311000-memory.dmp
memory/1284-19-0x0000000000280000-0x0000000000281000-memory.dmp
memory/1284-17-0x0000000000280000-0x0000000000281000-memory.dmp
memory/1284-14-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1284-12-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1284-9-0x0000000000250000-0x0000000000251000-memory.dmp
memory/1284-7-0x0000000000250000-0x0000000000251000-memory.dmp
memory/1284-5-0x0000000000250000-0x0000000000251000-memory.dmp
memory/1284-4-0x0000000000230000-0x0000000000231000-memory.dmp
memory/1284-2-0x0000000000230000-0x0000000000231000-memory.dmp
memory/1284-0-0x0000000000230000-0x0000000000231000-memory.dmp
memory/1284-45-0x0000000000400000-0x000000000144C000-memory.dmp
memory/1284-44-0x0000000000400000-0x000000000144C000-memory.dmp
memory/1284-46-0x0000000000400000-0x000000000144C000-memory.dmp