Analysis

  • max time kernel
    140s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 16:49

General

  • Target

    815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87.exe

  • Size

    73KB

  • MD5

    13a48107a85acd009c17d29f60324c70

  • SHA1

    3cd5bc7a3ca4932cf35d3e659adf1f894d2d156a

  • SHA256

    815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87

  • SHA512

    f1e9daf79d757941221369eae4cf8d2cfc113cc709e711b887c7f8abb6dff0ebaa910015066e8f25dd1e97d11306bdf38afb1538911ae4fc2946557a4038b756

  • SSDEEP

    1536:6ASVYvU/81RTl6o2GR7ulOdTW7t92tzaO4vxgidzd3:CKt1R/2GR7+7tIX4JFdx3

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87.exe
    "C:\Users\Admin\AppData\Local\Temp\815065f5f9e227d31991bffb235673b9eb28960a8ccd5b09cb1ab8eb9db49c87.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4084

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4084-132-0x0000000000F50000-0x0000000000F6D000-memory.dmp

          Filesize

          116KB

        • memory/4084-133-0x0000000000F50000-0x0000000000F6D000-memory.dmp

          Filesize

          116KB