Analysis
-
max time kernel
47s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 12:59
Behavioral task
behavioral1
Sample
0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe
Resource
win10v2004-20220901-en
General
-
Target
0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe
-
Size
1.2MB
-
MD5
ad9bd83cafcdb61e6cf228ac45e533f7
-
SHA1
6c21a1e80cc9b0cd17bb85d564e043e7df1e48d6
-
SHA256
0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c
-
SHA512
54bfbdc1cce6925933f5618eecda78d40306ff8eeec87f67015b4b8e33fdd45af97bc9724d38b92cc43900213c1c5841a4cb93491406df9dffe9d2c8c54c9548
-
SSDEEP
24576:SiokM/5nFRxz5BPEP7EikWBiTJ+aLolmlrvwPWBFh0enPV8a3QefhI557B66:Sj/FjzQP11iFvLolmlTdyathIT746
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2028-54-0x0000000000400000-0x0000000000762000-memory.dmp vmprotect behavioral1/memory/2028-58-0x0000000000400000-0x0000000000762000-memory.dmp vmprotect behavioral1/memory/2028-60-0x0000000000400000-0x0000000000762000-memory.dmp vmprotect behavioral1/memory/2028-61-0x0000000000400000-0x0000000000762000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exepid process 2028 0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exepid process 2028 0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe"C:\Users\Admin\AppData\Local\Temp\0aaed88168866035929b798dd1b60e3e80caa3676a4b79d74eab94046db3ba3c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2028-54-0x0000000000400000-0x0000000000762000-memory.dmpFilesize
3.4MB
-
memory/2028-58-0x0000000000400000-0x0000000000762000-memory.dmpFilesize
3.4MB
-
memory/2028-59-0x0000000076961000-0x0000000076963000-memory.dmpFilesize
8KB
-
memory/2028-60-0x0000000000400000-0x0000000000762000-memory.dmpFilesize
3.4MB
-
memory/2028-61-0x0000000000400000-0x0000000000762000-memory.dmpFilesize
3.4MB