Analysis

  • max time kernel
    116s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 09:40

General

  • Target

    67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe

  • Size

    5.6MB

  • MD5

    75a7c6a2cb7ee9a78da9458980c6bf9f

  • SHA1

    1441de90928c63974d103873c6cd506e183e6ed6

  • SHA256

    67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4

  • SHA512

    2d0ed260cf9588e1464a909aa59b54683f43e91a684462686d487c6f16e8b5b1699d9fc3ef9dec2c853f171670b957bb1298309170d9ce88f0e956c0ac74a3c7

  • SSDEEP

    98304:kSNpe3OaLCqmKQhPuiqNk3QbypR5L2Arsg6uww09zSGmoTqT8Kl2T8WysWWOqLMN:kSNpeZlmKTAUK76tzPmmqgKl2T8WXWW8

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe
    "C:\Users\Admin\AppData\Local\Temp\67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4352-132-0x0000000000400000-0x0000000000E28000-memory.dmp
    Filesize

    10.2MB

  • memory/4352-135-0x0000000000400000-0x0000000000E28000-memory.dmp
    Filesize

    10.2MB

  • memory/4352-136-0x0000000000400000-0x0000000000E28000-memory.dmp
    Filesize

    10.2MB