Analysis

  • max time kernel
    41s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 06:21

General

  • Target

    0ca03ca4890836be6ff2e4d8cbbca786aa5684c65398197de3584b7292ae4093.exe

  • Size

    639KB

  • MD5

    dd4fa1b64ab3c000a0b7711bbf0890fa

  • SHA1

    b1c1190e9ebd17588514fd852fc20e71a05306a5

  • SHA256

    0ca03ca4890836be6ff2e4d8cbbca786aa5684c65398197de3584b7292ae4093

  • SHA512

    83d01cfe79db18c59acd9ca6e5ce44bc9b87a20d83d732446db89417a76645d86c106bbcedf08d255f132edd96093925a35a03f33ad05bb80c845a4f15258647

  • SSDEEP

    12288:Inusk8WXp6zspnjm6jti8uSuiuLr+ussvSDmrd7ES6z1RkqeFVJcHS03UD:uk866zqi6jti8uS4+ussqDogS6zX4Fb3

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ca03ca4890836be6ff2e4d8cbbca786aa5684c65398197de3584b7292ae4093.exe
    "C:\Users\Admin\AppData\Local\Temp\0ca03ca4890836be6ff2e4d8cbbca786aa5684c65398197de3584b7292ae4093.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/476-132-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/476-133-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB