Analysis

  • max time kernel
    81s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 18:33

General

  • Target

    facf60446605833f59f999d3945d16464fea754a943286b59b331f014e6221c1.exe

  • Size

    958KB

  • MD5

    18ef2f9f0d824588477209ab2d906b34

  • SHA1

    f8d2d1c6d48f12c4d283278b8b6f8d9b3dcc1962

  • SHA256

    facf60446605833f59f999d3945d16464fea754a943286b59b331f014e6221c1

  • SHA512

    0cbdd95f9483ee9836773ddaa99379f7247344ac533d252d7d0c2349cb223cb2d601bd13746e93405b0cec33810b5e125a0e3936d9d45fcda2d10a46b28aaa54

  • SSDEEP

    24576:BfQPOkpin37hD97vcnC4sBeEOoCmP7zcK:Bf8ncNh7w4CmP7

Score
8/10

Malware Config

Signatures

  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\facf60446605833f59f999d3945d16464fea754a943286b59b331f014e6221c1.exe
    "C:\Users\Admin\AppData\Local\Temp\facf60446605833f59f999d3945d16464fea754a943286b59b331f014e6221c1.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3724-132-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-134-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-133-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-138-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-140-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-142-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-144-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-147-0x0000000000400000-0x0000000000703000-memory.dmp

    Filesize

    3.0MB

  • memory/3724-146-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-149-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-151-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-155-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-157-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-159-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-161-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-163-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-153-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-165-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-169-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-167-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-171-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-173-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-175-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3724-176-0x0000000000400000-0x0000000000703000-memory.dmp

    Filesize

    3.0MB