Analysis

  • max time kernel
    134s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2022 22:53

General

  • Target

    7c52172af8ae6fadbfcc2ba18401a293649e5a8670dda9a8f78f2f11b0e5b2b2.exe

  • Size

    128KB

  • MD5

    2342a106181d72c9dc39c20631b8cd41

  • SHA1

    7cfabd6ca5ef88ce53586da0c1d9bacd7896eed3

  • SHA256

    7c52172af8ae6fadbfcc2ba18401a293649e5a8670dda9a8f78f2f11b0e5b2b2

  • SHA512

    68f2fe662b0425302146ab7a3b7233bffb914d46459976b5dfd89d973ed729f5ded670df2d27adb31a862bc59ae88e39b89cce379d16e46730bafb060fad9e75

  • SSDEEP

    3072:Hh1Qy3enbhcsUD/yv4PlkTHx9BAi9RVRoKXYfyhnC:Hcy3+9q6vjWAVynytC

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c52172af8ae6fadbfcc2ba18401a293649e5a8670dda9a8f78f2f11b0e5b2b2.exe
    "C:\Users\Admin\AppData\Local\Temp\7c52172af8ae6fadbfcc2ba18401a293649e5a8670dda9a8f78f2f11b0e5b2b2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe c:\Progra~1\dnf\vixgtsfep.dll Porn
      2⤵
        PID:4296
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\7C5217~1.EXE
        2⤵
          PID:4268

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\vixgtsfep.dll

        Filesize

        108KB

        MD5

        5f8a5359579310153589d37ec1409db3

        SHA1

        aaa6eff4a812d0a6368725289fe3a7fe98b8f3ca

        SHA256

        1ce7792b215f825addee74c350aa0c656a2ea7d4e3f11732c8281b5b509902f7

        SHA512

        ea1f59e1b34db901aefa00afc7734f91a29cc1350e4aeb21a469945ac58c0bcee11331a7f85316dddbbf497d2b554c895cb2d6d622b4b47e7e3d6f6015e40ab8