Analysis

  • max time kernel
    38s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 03:56

General

  • Target

    cftyfzhq/[散人]CF体验服转换.exe

  • Size

    612KB

  • MD5

    884a33ef39413276cb6d2e29491ad852

  • SHA1

    61713c42ce4b3373d74565c095459404677ca25b

  • SHA256

    fee51477c9805fe9dc1a1cda9c598fa6b853fb60fafce4d4a4a4002a0cf901d3

  • SHA512

    1efec4e0bb48b100260a595608015bf0a4dff8349105f3d67a5d5c657c570399f59f0785aef1a78d7777c0d636da14d7cd65ad9eeb526563f2924b8f8e9ea3b6

  • SSDEEP

    12288:gXvVbUISJIl0bwwAMrXUf4lv4+P9EtepRYbcWM635Q+lIn1r1xpZUe84K+gvhH0Z:wNU3c00CrX3vTP91DY3bJQIIn1r1xIen

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cftyfzhq\[散人]CF体验服转换.exe
    "C:\Users\Admin\AppData\Local\Temp\cftyfzhq\[散人]CF体验服转换.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:1460

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1460-54-0x0000000075D01000-0x0000000075D03000-memory.dmp
    Filesize

    8KB

  • memory/1460-55-0x0000000000400000-0x00000000005FE000-memory.dmp
    Filesize

    2.0MB

  • memory/1460-57-0x0000000000400000-0x00000000005FE000-memory.dmp
    Filesize

    2.0MB

  • memory/1460-58-0x0000000000400000-0x00000000005FE000-memory.dmp
    Filesize

    2.0MB