Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 11:37

General

  • Target

    config.exe

  • Size

    1.1MB

  • MD5

    fa24a03ef43419c0d6c722869970020e

  • SHA1

    145686908842efab60d1c178103d77b314e3560f

  • SHA256

    5318221ef1e8c1a309149d5c2697a35738c739c99e68bd1abfbd9af248bef436

  • SHA512

    94293bea498d63a588b0a289b5053db8ebfd66504dd8fe60c4ed2c6a8f01b51920a6c2ca7d2a2ccfc3040cd8054d328a606f96ff72eb168f8aca80e147914c0e

  • SSDEEP

    24576:DmTx63e1uLV4XTN0uCNln2dhIz9QkZrcwI0jdnJsmcKR:DmNY3VKyuAV6hE9QEIWsmcO

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\config.exe
    "C:\Users\Admin\AppData\Local\Temp\config.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-0-0x00007FFC5D600000-0x00007FFC5DA8C000-memory.dmp

    Filesize

    4.5MB