Analysis
-
max time kernel
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2022 08:39
Behavioral task
behavioral1
Sample
new.exe
Resource
win10v2004-20220722-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
new.exe
-
Size
52.2MB
-
MD5
694d136bd716317889a2d539e053be75
-
SHA1
df54f322101db21116edba956c105ff321980446
-
SHA256
0221a5a2845e3be848ea276c1d573b45a7496d2b51a04cd1135ddb5db41a20a3
-
SHA512
d625a5326ae5a0347b232dd5da2fea77c3ec806ef50bd3efbf35ac29d78c440fa3dda0f4f09e6be538171a5b3e88db6627964f5df8b07a57b02658bd42e901e6
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1528-132-0x0000000140000000-0x00000001437A4000-memory.dmp vmprotect behavioral1/memory/1528-133-0x0000000140000000-0x00000001437A4000-memory.dmp vmprotect behavioral1/memory/1528-135-0x0000000140000000-0x00000001437A4000-memory.dmp vmprotect behavioral1/memory/1528-136-0x0000000140000000-0x00000001437A4000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
new.exepid process 1528 new.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
new.exepid process 1528 new.exe 1528 new.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1528-132-0x0000000140000000-0x00000001437A4000-memory.dmpFilesize
55.6MB
-
memory/1528-133-0x0000000140000000-0x00000001437A4000-memory.dmpFilesize
55.6MB
-
memory/1528-135-0x0000000140000000-0x00000001437A4000-memory.dmpFilesize
55.6MB
-
memory/1528-136-0x0000000140000000-0x00000001437A4000-memory.dmpFilesize
55.6MB