Analysis

  • max time kernel
    171s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 16:49

General

  • Target

    815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87.exe

  • Size

    73KB

  • MD5

    13a48107a85acd009c17d29f60324c70

  • SHA1

    3cd5bc7a3ca4932cf35d3e659adf1f894d2d156a

  • SHA256

    815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87

  • SHA512

    f1e9daf79d757941221369eae4cf8d2cfc113cc709e711b887c7f8abb6dff0ebaa910015066e8f25dd1e97d11306bdf38afb1538911ae4fc2946557a4038b756

  • SSDEEP

    1536:6ASVYvU/81RTl6o2GR7ulOdTW7t92tzaO4vxgidzd3:CKt1R/2GR7+7tIX4JFdx3

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87.exe
    "C:\Users\Admin\AppData\Local\Temp\815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1820-55-0x0000000001060000-0x000000000107D000-memory.dmp

    Filesize

    116KB