Analysis

  • max time kernel
    109s
  • max time network
    116s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/07/2024, 18:30

General

  • Target

    default browser.exe

  • Size

    11.6MB

  • MD5

    49c89f5429d47efdae5b868be75b3090

  • SHA1

    c678f2d5074b68327c8934375fd6073bddf4ea12

  • SHA256

    04ec1f894dfdb8190c12136f8e2b47c6c747a5a82c2ddee156f9a88f6803cc01

  • SHA512

    8298ef67dbb1a4c6ae53fbba183ecabae8e5c6eaaa7998ab7bb99f3ddc6d572bf8ff3a3a293fe5dc4298451c5cac8fb863ec9e80d27346edd8a51f824db879a5

  • SSDEEP

    196608:t7w4q1zd2iAW/paeBPfN53KCk3PrthK6t6eV4fn3upQiq7RgVk1FOhATJuSIZVLM:t7wZ1zkBW/paeB33MBhK2VMn+s7qVcMm

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\default browser.exe
    "C:\Users\Admin\AppData\Local\Temp\default browser.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4368

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4368-0-0x000000014005C000-0x00000001407D9000-memory.dmp

          Filesize

          7.5MB

        • memory/4368-1-0x00007FFF457B0000-0x00007FFF457B2000-memory.dmp

          Filesize

          8KB

        • memory/4368-2-0x00007FFF457C0000-0x00007FFF457C2000-memory.dmp

          Filesize

          8KB

        • memory/4368-6-0x0000000140000000-0x0000000141373000-memory.dmp

          Filesize

          19.4MB

        • memory/4368-3-0x0000000140000000-0x0000000141373000-memory.dmp

          Filesize

          19.4MB

        • memory/4368-7-0x0000000140000000-0x0000000141373000-memory.dmp

          Filesize

          19.4MB

        • memory/4368-8-0x000000014005C000-0x00000001407D9000-memory.dmp

          Filesize

          7.5MB

        • memory/4368-9-0x0000000140000000-0x0000000141373000-memory.dmp

          Filesize

          19.4MB