Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 22:32

General

  • Target

    ClientHide.exe

  • Size

    17KB

  • MD5

    ae3f2f2fc13c130d70df126b14c51210

  • SHA1

    dd62ba08f61818dd02436746a8d46bc3c05dac25

  • SHA256

    21b4ab255d4c40540be00c93e10a274671812c7318f7f6a3fd2ebd92ba4e8b86

  • SHA512

    64359bb252c0f0e189ec4a9f8bf6f910986b5bfa9857bb046bc7d07368982800c09699a8e7ef2aa65c6bfba324fa3a8b7cc0ba4625634389eef6895b40378adb

  • SSDEEP

    384:+c0d1j2vP1cys8z6204/m5izTwhK/bmmABvRPJnMbES+kKoll3cbXsVK/yN2q92:+ci1QOK/6UKo8U3

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ClientHide.exe
    "C:\Users\Admin\AppData\Local\Temp\ClientHide.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4816

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4816-0-0x00007FFAC12F5000-0x00007FFAC12F6000-memory.dmp

    Filesize

    4KB

  • memory/4816-1-0x000000001BE50000-0x000000001C31E000-memory.dmp

    Filesize

    4.8MB

  • memory/4816-3-0x000000001C320000-0x000000001C3C6000-memory.dmp

    Filesize

    664KB

  • memory/4816-2-0x00007FFAC1040000-0x00007FFAC19E1000-memory.dmp

    Filesize

    9.6MB

  • memory/4816-4-0x000000001C490000-0x000000001C4F2000-memory.dmp

    Filesize

    392KB

  • memory/4816-5-0x00007FFAC1040000-0x00007FFAC19E1000-memory.dmp

    Filesize

    9.6MB

  • memory/4816-6-0x00007FFAC1040000-0x00007FFAC19E1000-memory.dmp

    Filesize

    9.6MB

  • memory/4816-7-0x00007FFAC12F5000-0x00007FFAC12F6000-memory.dmp

    Filesize

    4KB