Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 08:51
Static task
static1
Behavioral task
behavioral1
Sample
Virtual DJ Studio 8.1.2/Crack/vdj.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Virtual DJ Studio 8.1.2/Crack/vdj.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Virtual DJ Studio 8.1.2/VDJSetup.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Virtual DJ Studio 8.1.2/VDJSetup.exe
Resource
win10v2004-20220812-en
General
-
Target
Virtual DJ Studio 8.1.2/VDJSetup.exe
-
Size
25.3MB
-
MD5
8f14db8dba3bf40ff51c0e0c5333f3a0
-
SHA1
ec8a38fa11d82ec82aae0c85d604658593756504
-
SHA256
1149bf17610a9909d36a4924b4cb9195065bb23762eeff57a7fff89b8a1b68f6
-
SHA512
5ce03fdd7a61e0b6625fee7697710524a468a456baa824dfe1d897de567732b56bcabc6ddd622bf835c10d4529b953b1524ff4f11c146c245147023eeb761aa5
-
SSDEEP
393216:NCwhWygWlZBnDBju9kYJkUpJGNWA2KzL/Vkc1wvEArhHYvdWKSpZJFJGNOtIK4eW:zhWECIOGYGYxrhH2YKy7GID4ya5t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4924 VDJSetup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4924 3460 VDJSetup.exe 83 PID 3460 wrote to memory of 4924 3460 VDJSetup.exe 83 PID 3460 wrote to memory of 4924 3460 VDJSetup.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Virtual DJ Studio 8.1.2\VDJSetup.exe"C:\Users\Admin\AppData\Local\Temp\Virtual DJ Studio 8.1.2\VDJSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\is-1BOGO.tmp\VDJSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-1BOGO.tmp\VDJSetup.tmp" /SL5="$F01DA,26073059,222208,C:\Users\Admin\AppData\Local\Temp\Virtual DJ Studio 8.1.2\VDJSetup.exe"2⤵
- Executes dropped EXE
PID:4924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD562080f2fa618efacbe53113c0a80a3ee
SHA1f795df2f52658c6eb2d42718fbde63d1b079378d
SHA256a9bc8be18307367be83014c509a8866677fb977e5862d70a6c3bef74eb265879
SHA5124eefa307bfc2ca60ab9dca29e1492617c69e427e56ffa06c92eb0052477ea013da96d0536793e992053e896b8e06eb5bc10ba217d56aad51c243d54272f546ae