Analysis

  • max time kernel
    19s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2023 22:25

General

  • Target

    Filmora9/FilmoraHdpiConfig.exe

  • Size

    490KB

  • MD5

    f0ccfc0b85778d0effc6862a50371420

  • SHA1

    24504af8a363b581c20f350702a5a43ab76b925c

  • SHA256

    df7ab8ce93bd3cf5158c6b9e6c4411df3a6812cf7adc56f4c686b14e71160277

  • SHA512

    ab4b109bbf25249a01315d85cfe0cba4311f5f5e7e370a79bae6c50c5e97f568197d8f25e42013f39e552a8f571cba8b5a027c852403bb56dd09477cf321f9ea

  • SSDEEP

    6144:u9kIKHXAMk3j8sOW7wMi4M5oU1Vh5vVclGIMmATNrhDt7uzi1j0u27Gz:RIDM5oU1Vh5vVclGIMmA5VxqG1wu2W

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Filmora9\FilmoraHdpiConfig.exe
    "C:\Users\Admin\AppData\Local\Temp\Filmora9\FilmoraHdpiConfig.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1732

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1732-54-0x0000000074570000-0x0000000074AB2000-memory.dmp
    Filesize

    5.3MB

  • memory/1732-55-0x000007FEF5FA0000-0x000007FEF61E6000-memory.dmp
    Filesize

    2.3MB

  • memory/1732-58-0x00000000024A0000-0x0000000002649000-memory.dmp
    Filesize

    1.7MB

  • memory/1732-66-0x0000000002360000-0x00000000023CC000-memory.dmp
    Filesize

    432KB

  • memory/1732-74-0x0000000037440000-0x0000000037450000-memory.dmp
    Filesize

    64KB

  • memory/1732-73-0x000007FEBD440000-0x000007FEBD450000-memory.dmp
    Filesize

    64KB

  • memory/1732-75-0x000007FEF5FA0000-0x000007FEF61E6000-memory.dmp
    Filesize

    2.3MB

  • memory/1732-76-0x000007FEF5FA0000-0x000007FEF61E6000-memory.dmp
    Filesize

    2.3MB