Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:28

General

  • Target

    f72e66b074b765bba3a1dfff2efc4576b4bab5d2de1912cfd26aefa3db295428.exe

  • Size

    5.4MB

  • MD5

    270f3e6cab39aa6a94cdcb86fe50c07e

  • SHA1

    047f322b3ca8bf97e734ab7d7e5f9e04ebc5c45f

  • SHA256

    f72e66b074b765bba3a1dfff2efc4576b4bab5d2de1912cfd26aefa3db295428

  • SHA512

    c2420e8c7bd8b6ef9762cfe3b3f3d64fd37d108f44debfb14de76c2804c78d9481706da9aa1f81e878419a46f2faf79a947da4aad136e0e03d8354230f7d8663

  • SSDEEP

    98304:ZG4URFwS/8BoPWU7pNE0jT+C75nTjEDyevgdl2YDlTKtwFh1moNx9zYEW7b86SeK:ZVUP/XPWUZRcuev+l2YDlTKtwFh1my9W

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f72e66b074b765bba3a1dfff2efc4576b4bab5d2de1912cfd26aefa3db295428.exe
    "C:\Users\Admin\AppData\Local\Temp\f72e66b074b765bba3a1dfff2efc4576b4bab5d2de1912cfd26aefa3db295428.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2348-132-0x0000000000FE0000-0x0000000001884000-memory.dmp

    Filesize

    8.6MB

  • memory/2348-134-0x0000000000FE0000-0x0000000001884000-memory.dmp

    Filesize

    8.6MB

  • memory/2348-135-0x0000000000FE0000-0x0000000001884000-memory.dmp

    Filesize

    8.6MB