Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 15:47

General

  • Target

    SecuriteInfo.com.W32.Trojan.JO.gen.Eldorado.30855.19766.exe

  • Size

    2.0MB

  • MD5

    739c2110f4f011a876a85236b712a693

  • SHA1

    be152c5a2e0e359da75f2d0a288ccce2a4038b0a

  • SHA256

    acd36a30f0a6b3a775ff39250f9b9daf724961b84467bc8825e6f006c531845f

  • SHA512

    931a94f8a550729294c26e3a3f1375c053199332523e02bf20059640a1e2b139013ce8691aac4f1fb9e9eeef73e65206cae22ea2aaa4a88725df36a8baf08792

  • SSDEEP

    49152:WUfEABj5fngKeWTAjyFdHUlxM8WlO6Tjk1KAm3/lZF2l:5EABja2Uj+dHo65w6PkkxPlQ

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Trojan.JO.gen.Eldorado.30855.19766.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Trojan.JO.gen.Eldorado.30855.19766.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3340-133-0x0000000000400000-0x000000000055C000-memory.dmp
    Filesize

    1.4MB

  • memory/3340-135-0x0000000000400000-0x000000000055C000-memory.dmp
    Filesize

    1.4MB

  • memory/3340-136-0x0000000000400000-0x000000000055C000-memory.dmp
    Filesize

    1.4MB