Analysis

  • max time kernel
    135s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 19:36

General

  • Target

    a38d0f77696d9843fb92d8ace590c154f1641891b64764ae04938f68785ad093.exe

  • Size

    13.3MB

  • MD5

    69a525eaafb81a2bc3ba8c89eb652a42

  • SHA1

    5db07bc983ea9ddc2c9070cf011f03c1d322085c

  • SHA256

    a38d0f77696d9843fb92d8ace590c154f1641891b64764ae04938f68785ad093

  • SHA512

    41caea669c576098809d6003ec133fdb5096134f728eb6b19318210fae78acf675b9f4f6d3cf1b28a8b6515a3343e9008ae81ca63c23aa76249979c26ed9a979

  • SSDEEP

    196608:tX4JxepJLo7csYyENuw7TVDEKsSvPnYDBIbFu5mbVVLR6OyPIE:tX4JxepJLo77Yy27TVDEMQGbVN

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a38d0f77696d9843fb92d8ace590c154f1641891b64764ae04938f68785ad093.exe
    "C:\Users\Admin\AppData\Local\Temp\a38d0f77696d9843fb92d8ace590c154f1641891b64764ae04938f68785ad093.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1952-0-0x0000000001310000-0x0000000001311000-memory.dmp

    Filesize

    4KB

  • memory/1952-8-0x0000000000AA8000-0x0000000000E91000-memory.dmp

    Filesize

    3.9MB

  • memory/1952-6-0x0000000003050000-0x0000000003051000-memory.dmp

    Filesize

    4KB

  • memory/1952-5-0x0000000003040000-0x0000000003041000-memory.dmp

    Filesize

    4KB

  • memory/1952-4-0x0000000003030000-0x0000000003031000-memory.dmp

    Filesize

    4KB

  • memory/1952-3-0x0000000003020000-0x0000000003021000-memory.dmp

    Filesize

    4KB

  • memory/1952-7-0x0000000000400000-0x0000000001153000-memory.dmp

    Filesize

    13.3MB

  • memory/1952-2-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

    Filesize

    4KB

  • memory/1952-1-0x0000000001830000-0x0000000001831000-memory.dmp

    Filesize

    4KB

  • memory/1952-9-0x0000000000400000-0x0000000001153000-memory.dmp

    Filesize

    13.3MB

  • memory/1952-10-0x0000000000AA8000-0x0000000000E91000-memory.dmp

    Filesize

    3.9MB

  • memory/1952-11-0x0000000000400000-0x0000000001153000-memory.dmp

    Filesize

    13.3MB