Overview
overview
10Static
static
3Themida.exe
windows10-2004-x64
10Themida64.exe
windows10-2004-x64
10ThemidaHelp.chm
windows10-2004-x64
1ThemidaSDK...in.xml
windows10-2004-x64
1ThemidaSDK...in.dll
windows10-2004-x64
3ThemidaSDK...t1.xml
windows10-2004-x64
1ThemidaSDK...ct1.js
windows10-2004-x64
1ThemidaSDK...e.html
windows10-2004-x64
1ThemidaSDK...le.xml
windows10-2004-x64
1ThemidaSDK...10.xml
windows10-2004-x64
1ThemidaSDK...llo.js
windows10-2004-x64
1ThemidaSDK...t1.xml
windows10-2004-x64
1ThemidaSDK...ct1.js
windows10-2004-x64
1ThemidaSDK...le.xml
windows10-2004-x64
1ThemidaSDK...llo.js
windows10-2004-x64
1ThemidaSDK...pt.exe
windows10-2004-x64
1ThemidaSDK...on.pdf
windows10-2004-x64
1ThemidaSDK...32.dll
windows10-2004-x64
1ThemidaSDK...64.dll
windows10-2004-x64
1WinlicenseSDK.dll
windows10-2004-x64
3demangler.dll
windows10-2004-x64
3libspv.dll
windows10-2004-x64
1vcomp140.dll
windows10-2004-x64
3Analysis
-
max time kernel
59s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
Themida.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Themida64.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
ThemidaHelp.chm
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
ThemidaSDK/ExamplesSDK/Plugins/Examples/C/TestPlugin/TestPlugin.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
ThemidaSDK/ExamplesSDK/Plugins/Examples/Delphi/TestPlugin.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/CBuilder/Project1.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/C/Visual C++/vc_example.vcproj.7.10.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
ThemidaSDK/ExamplesSDK/Protectio Macros(Check Protection)/Rust/hello.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
ThemidaSDK/ExamplesSDK/Protection Macros/C/CBuilder/Project1.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
ThemidaSDK/ExamplesSDK/Protection Macros/Rust/hello.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
ThemidaSDK/ExamplesSDK/Protection Macros/Visual Basic/Vb6NoOpt.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
ThemidaSDK/Include/C/Via ASM module/How to add ASM files in your Solution.pdf
Resource
win10v2004-20230221-en
Behavioral task
behavioral18
Sample
ThemidaSDK/SecureEngineSDK32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
ThemidaSDK/SecureEngineSDK64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
WinlicenseSDK.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
demangler.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
libspv.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
vcomp140.dll
Resource
win10v2004-20230220-en
General
-
Target
ThemidaSDK/ExamplesSDK/Protection Macros/C/Visual C++(via ASM module)/vc_example.xml
-
Size
11KB
-
MD5
179859857a2960f22142026f075534f5
-
SHA1
3cb45d1e4b76fdcdeb52ec804b3802ddbb18de2e
-
SHA256
c76408e442991448f4c05dc3462d28db32c4fe85515431716e1a4f31473f44d0
-
SHA512
f203c460bd52b4b86b2be0878180a43f5c94fa9f101b97fa1b6b72bbf8dbc015f80d28aac89795bc95e18cb15c79aee0cd521ade94d3c0db807cf0d6d13ba9dc
-
SSDEEP
192:E7kEqgkPp4T6U53CEqpCQ7EqCkPp4T6U53CEqbfQjwZibRZnpwwi6Rwnl:vDvqCrCQ7ZvqC5fQjwZibRZnpwwi6Rwl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2023852660" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8064c479e18ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31035105" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208aea79e18ed901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c686c0d6fd519d4bbe65ff9f9421142000000000020000000000106600000001000020000000e7c20c6d2fac003d6ee62a0a03c35f2b3df7481f7fb07be21d4326fa53195f1c000000000e800000000200002000000027267d4df1565fb4d827b89f093facb3d101941195d52082daf2d506bc74288d200000006e3042b423e034714f39d1246719e02afd1f51119654f50dcb3e3b7410c0f77d40000000de9f6205506ac228d52fb3ca9c0b9ff0bbdc5e66e84a1b3c95e4f22a769961b3c7710e2963baed4e10506afb86d1db1d2137d3b3f908f4808eef66a9e0c440ee iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31035105" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c686c0d6fd519d4bbe65ff9f9421142000000000020000000000106600000001000020000000d66c984d85e653383a4cd553d85a42d8b3840929cfccfbdd668586cf00fafe69000000000e8000000002000020000000125e6668d8c07b4a316eba42cc709bc6ddffcdb2c88d66c0359e451cdea6820e200000009f46fd31e7b1a1489d4038ef831425df52a0242dfe909eb8ab71c7b83a2f1331400000002e6930b4bed238b2a09e316b0d1b85dbb997b7f857d2166b5de705626f84df5b7975cfe3b1092eb1894ab430b74d0dd8f3b1e1eab6bda42627f0bd53e5d43c68 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2002913222" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2002913222" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31035105" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A23032BD-FAD4-11ED-9156-F6AC10968584} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4928 iexplore.exe 4928 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4928 2236 MSOXMLED.EXE 83 PID 2236 wrote to memory of 4928 2236 MSOXMLED.EXE 83 PID 4928 wrote to memory of 2400 4928 iexplore.exe 85 PID 4928 wrote to memory of 2400 4928 iexplore.exe 85 PID 4928 wrote to memory of 2400 4928 iexplore.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ThemidaSDK\ExamplesSDK\Protection Macros\C\Visual C++(via ASM module)\vc_example.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ThemidaSDK\ExamplesSDK\Protection Macros\C\Visual C++(via ASM module)\vc_example.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4928 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53fbb8ee33354096d9f116c557a402d14
SHA1f75756c42d45d1047eb04fa54bd7702f5560df4b
SHA25613e2696561dd0955e1d61f7e18166c8bd7a02faf1dbfe04e738b5d68cc2ca57e
SHA512cc21e56f9278282b3c15964b5618d42bdfda83b245d7bf01d12550aabd69a9747d1deaa5a9a9830e6d6a47465f580e21e0a7621cf992b56244ad4bee8779c338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5da1de5b2445607545542e508a703005b
SHA175566cfd87264298e0461db93aa6269ea59ccb1a
SHA256fb4fe1b908d8105e67a113c40daa6ddc295bfbe7cc5c7f36d2d1bbb3263a5380
SHA5125023d297df0447d2455e033df251e8fd6f64d95c0635cc7fc727fe40d431cfd5ef61a67e79593731b0c8743017d70cc9d595f8da9d3fd6704201a6f4ac38e362