Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2023, 11:11

General

  • Target

    tmp.exe

  • Size

    5.3MB

  • MD5

    cb77eac7737661d48dfedbccd07e0d95

  • SHA1

    ddb0c70e122a5970b76ab3e62aafa601a8326f51

  • SHA256

    74d63f658c7d76570d226e2f5535ebe18b33fa1696653ce520810c14511b0266

  • SHA512

    79cc356fc099a5c8b317bd2ff8e9e7703e49e6a873cafdf7fef8bef0169d4250686f4ec93b71b873a9682424225ef5e291585e444b663e2390511a498183c588

  • SSDEEP

    98304:fZjbxmUu9NHQZKgVpQhRsuQOfAssiYD5XrEmZ5GMreeb8KJqfNLq6VqGjGt:RjbxfXZKJhlQhJiYrP5NiebsNBVqGS

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\shellcode.bin

    Filesize

    300KB

    MD5

    a40a214db11296040db96cdfd3969e08

    SHA1

    f79b6b66ba9366f2e3b4bdef53191e79c122f5bb

    SHA256

    185c9786657c6d08c7e4eb259f5ead74093b1d9191758a51203c528cf5a9fa2d

    SHA512

    90500ad6b261335dc70a78b6efa2ad4016a299b5d9aad582e28f306098b7b03d6b2e02b26baab9fd417bf20517147e715a65393089b168c6e27c8053d927ea92

  • memory/4376-133-0x00007FFC8EA30000-0x00007FFC8EA32000-memory.dmp

    Filesize

    8KB

  • memory/4376-134-0x00007FF683160000-0x00007FF683AA0000-memory.dmp

    Filesize

    9.2MB

  • memory/4376-143-0x0000022D2A0D0000-0x0000022D2A11C000-memory.dmp

    Filesize

    304KB

  • memory/4376-144-0x0000000180000000-0x0000000180054000-memory.dmp

    Filesize

    336KB

  • memory/4376-150-0x0000000180000000-0x0000000180054000-memory.dmp

    Filesize

    336KB

  • memory/4376-152-0x0000000180000000-0x0000000180054000-memory.dmp

    Filesize

    336KB

  • memory/4376-153-0x0000000180000000-0x0000000180054000-memory.dmp

    Filesize

    336KB

  • memory/4376-154-0x0000000180000000-0x0000000180054000-memory.dmp

    Filesize

    336KB