Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
newuimatrix.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
newuimatrix.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
olduimatrix.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
olduimatrix.exe
Resource
win10v2004-20241007-en
General
-
Target
olduimatrix.exe
-
Size
1.7MB
-
MD5
980ddfdcc239b7ed4a525d08b62dea6c
-
SHA1
3d15cc4ba25c88be7bd253d757349899f39dd5de
-
SHA256
a9de575eff02f40d45172637b59cfb3f82e3a90c7ee6ef655b2b7034659a2821
-
SHA512
24222b4b06094f7fc1e507a8c1d3e7f6114068985db851dfdad9c01f5cad0982433135d3cd29d1dc6ab8ca7ef497204bb5799719efdfe67602e33e9925cd9e4d
-
SSDEEP
24576:0vpa5VbRIsWORo24qSpIifm3tLy4s4sb3c9Ho3FfbOKYJja3z:pzKKEpIbGzb3R1fbYJjk
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts olduimatrix.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5024 olduimatrix.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5024 olduimatrix.exe 5024 olduimatrix.exe 5024 olduimatrix.exe 5024 olduimatrix.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5024 olduimatrix.exe Token: SeDebugPrivilege 5024 olduimatrix.exe Token: SeLoadDriverPrivilege 5024 olduimatrix.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3520 Process not Found