Analysis

  • max time kernel
    86s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 14:13

General

  • Target

    d29ce37eef26ec270d62d218e1416f064d0c4466781eba002e436a27a8d59b69.exe

  • Size

    364KB

  • MD5

    960cee49affbb9cb83e3cd4f6e485939

  • SHA1

    f6911a1293ceedb5cfff0a8425eab2c6b4f94b2b

  • SHA256

    d29ce37eef26ec270d62d218e1416f064d0c4466781eba002e436a27a8d59b69

  • SHA512

    a7a5de3401c04b2e77c7519599bd58e138b32ba8a4446683a4b48a20b44bc8b13c2bd16df216b26e1ba2ad44a0e17d4279846fbdd6bc3d9dd26bf25406bfe7a8

  • SSDEEP

    6144:ppO/8yFRHc+onG7h8TgPYzTeB0DA5YRsTQ+oyQqsDCAcVhHR4O5Qt4:y/8y3NAGhgqYPeB0tG7Z/XQt4

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d29ce37eef26ec270d62d218e1416f064d0c4466781eba002e436a27a8d59b69.exe
    "C:\Users\Admin\AppData\Local\Temp\d29ce37eef26ec270d62d218e1416f064d0c4466781eba002e436a27a8d59b69.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1780

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1780-132-0x0000000000D00000-0x0000000000DA2000-memory.dmp

          Filesize

          648KB

        • memory/1780-135-0x0000000005E70000-0x0000000005F02000-memory.dmp

          Filesize

          584KB

        • memory/1780-136-0x00000000064C0000-0x0000000006A64000-memory.dmp

          Filesize

          5.6MB

        • memory/1780-137-0x00000000064A0000-0x00000000064B2000-memory.dmp

          Filesize

          72KB

        • memory/1780-138-0x000000000A020000-0x000000000A05C000-memory.dmp

          Filesize

          240KB

        • memory/1780-139-0x000000000AE00000-0x000000000AE66000-memory.dmp

          Filesize

          408KB