Analysis Overview
SHA256
9604ac38cf5bf34cc877112161a0186ce99f91ccbfc52edb1dd145d565eab50d
Threat Level: Known bad
The file 9604ac38cf5bf34cc877112161a0186ce99f91ccbfc52edb1dd145d565eab50d was found to be: Known bad.
Malicious Activity Summary
RisePro
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-10 07:45
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-10 07:42
Reported
2024-06-10 08:02
Platform
win7-20240221-en
Max time kernel
291s
Max time network
126s
Command Line
Signatures
RisePro
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9604ac38cf5bf34cc877112161a0186ce99f91ccbfc52edb1dd145d565eab50d.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\9604ac38cf5bf34cc877112161a0186ce99f91ccbfc52edb1dd145d565eab50d.exe
"C:\Users\Admin\AppData\Local\Temp\9604ac38cf5bf34cc877112161a0186ce99f91ccbfc52edb1dd145d565eab50d.exe"
Network
Files
memory/1368-0-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-2-0x0000000000864000-0x0000000000902000-memory.dmp
memory/1368-1-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-4-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-6-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-5-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-7-0x0000000000864000-0x0000000000902000-memory.dmp
memory/1368-8-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-9-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-10-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-11-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-12-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-13-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-14-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-15-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-16-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-17-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-18-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-19-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-20-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-21-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-22-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-23-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-24-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-25-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-26-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-27-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-28-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-29-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-30-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-31-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-32-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-33-0x00000000003D0000-0x0000000000902000-memory.dmp
memory/1368-34-0x00000000003D0000-0x0000000000902000-memory.dmp
Analysis: behavioral2
Detonation Overview
Reported
0001-01-01 00:00