Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 05:05

General

  • Target

    98e74550d2e533e60affb8b869a6a7608fb9887c81804c8424ab205a5edb4621.exe

  • Size

    15.2MB

  • MD5

    d3262e2ff0d487895343844f3462b33e

  • SHA1

    ff220ee196a0e7e19cf1d94dcf4fb3e573e2dfdb

  • SHA256

    98e74550d2e533e60affb8b869a6a7608fb9887c81804c8424ab205a5edb4621

  • SHA512

    e9b16e31304bfc09946d02ed82036e2ab3a129a3c16f2200ecaa2486add4d66cfb1be030127874516db01d4194a2746c8912a25fcd1b6d65f398e31ba0409448

  • SSDEEP

    393216:Usn0BBsruQZ9vOZ+uJb7GMprnEiFPc3a55U4hf:L03sruQP0+KLEec3qm4h

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98e74550d2e533e60affb8b869a6a7608fb9887c81804c8424ab205a5edb4621.exe
    "C:\Users\Admin\AppData\Local\Temp\98e74550d2e533e60affb8b869a6a7608fb9887c81804c8424ab205a5edb4621.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3276

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3276-0-0x0000000000400000-0x0000000002115000-memory.dmp

          Filesize

          29.1MB

        • memory/3276-1-0x0000000000900000-0x00000000011DA000-memory.dmp

          Filesize

          8.9MB

        • memory/3276-4-0x0000000002710000-0x0000000002711000-memory.dmp

          Filesize

          4KB

        • memory/3276-9-0x0000000002780000-0x0000000002781000-memory.dmp

          Filesize

          4KB

        • memory/3276-8-0x0000000002770000-0x0000000002771000-memory.dmp

          Filesize

          4KB

        • memory/3276-7-0x0000000002760000-0x0000000002761000-memory.dmp

          Filesize

          4KB

        • memory/3276-6-0x0000000002750000-0x0000000002751000-memory.dmp

          Filesize

          4KB

        • memory/3276-5-0x0000000002740000-0x0000000002741000-memory.dmp

          Filesize

          4KB

        • memory/3276-3-0x0000000002700000-0x0000000002701000-memory.dmp

          Filesize

          4KB

        • memory/3276-2-0x00000000026F0000-0x00000000026F1000-memory.dmp

          Filesize

          4KB

        • memory/3276-10-0x0000000000400000-0x0000000002115000-memory.dmp

          Filesize

          29.1MB

        • memory/3276-13-0x0000000000400000-0x0000000002115000-memory.dmp

          Filesize

          29.1MB

        • memory/3276-14-0x0000000000400000-0x0000000002115000-memory.dmp

          Filesize

          29.1MB

        • memory/3276-15-0x0000000000900000-0x00000000011DA000-memory.dmp

          Filesize

          8.9MB