Analysis

  • max time kernel
    49s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 03:25

General

  • Target

    EasyHook64Svc.exe

  • Size

    8KB

  • MD5

    a769c48087512d942b9461c2ad292295

  • SHA1

    37d0df5603a6b7b591e6f4f9345f2fd2118da828

  • SHA256

    361a8652870dfc554f2ef6d87c517a3c50770b90bc06e9d44b06d2005dd67bcd

  • SHA512

    b46aa8de3aafcb920f44e88c84dc55729366d067b56c52f9bb57e34fd33a3ae61566606c9bb02da2c879fec801fc0cb37ce355f1dfc42d076e7b15be0d5094e2

  • SSDEEP

    192:WfbEkWW2wQ9bLcK9xs3+ETZrOtVSuG3f+lMXGzF:+b4HH9btfs3+ElrA0Xf+lM2z

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EasyHook64Svc.exe
    "C:\Users\Admin\AppData\Local\Temp\EasyHook64Svc.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2736-0-0x00007FFD85903000-0x00007FFD85905000-memory.dmp
    Filesize

    8KB

  • memory/2736-1-0x0000000000170000-0x0000000000178000-memory.dmp
    Filesize

    32KB

  • memory/2736-2-0x00000000021F0000-0x0000000002204000-memory.dmp
    Filesize

    80KB

  • memory/2736-3-0x00007FFD85900000-0x00007FFD863C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2736-5-0x00007FFD85900000-0x00007FFD863C1000-memory.dmp
    Filesize

    10.8MB