Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2023 13:36

General

  • Target

    3375767161b3b427842c995a98a98beb09362ee1ff470bf574ceee69106d0e5d.exe

  • Size

    1.7MB

  • MD5

    50faaa9eeb829d1274455f64a660af0d

  • SHA1

    d7235bcc03501e75bca4afd39a6ff14707ca990d

  • SHA256

    3375767161b3b427842c995a98a98beb09362ee1ff470bf574ceee69106d0e5d

  • SHA512

    c7b2ef612cc3a55da2de667c331af36bd394ce1f28f80332640bafc7e8d36a7b5bc5aca32db7efaaaf8411acbc50221cfd9b87671c48cfe2cce5faaf02251fc6

  • SSDEEP

    49152:ZfaqmxNR7rVnCuIUfXxR1MFttORGBUgkz9XVdtqpL5W6AWFShGyYjRXJiKX0ycWt:Zfa3xNR7rVnCuIUfXxR1MFttORGBUgky

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3375767161b3b427842c995a98a98beb09362ee1ff470bf574ceee69106d0e5d.exe
    "C:\Users\Admin\AppData\Local\Temp\3375767161b3b427842c995a98a98beb09362ee1ff470bf574ceee69106d0e5d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\19dlq\Microsoft\Windows\Start Menu\Programs\startup\VCsite_ingcure.lnk

    Filesize

    1KB

    MD5

    16a1e85a9191f285752035dfb5c18a2a

    SHA1

    e24082d1f8047c512d49d641bec624620df61dec

    SHA256

    01dd171d37417238f05fea263f22adb76124594327e7e57784bc54899b7c3a7a

    SHA512

    471cc7455a3f65272e91c946c14b24b6638a123eb603380b9f9a3d6d9dba30d5f97709ece0e767cb7ea4c26824cf0a15a57c054368b5b5d72aedb587468fce21

  • C:\Users\Public\38glqy

    Filesize

    870KB

    MD5

    0c5909fd933c194bdada4a78553af5b0

    SHA1

    5ba72cc7d63374695c698f05b64edf635cc1c2e6

    SHA256

    b74daf87ddfa6761251c65236cd4cc5fdd73f37111fbcc1c7d4362b5396d3f56

    SHA512

    4dea7d6ae5c96a5fd4a27301e10824e901d8e7dcde0967a4c38ee9146ac8bf2d6b81b54e6fc7be35762011024b0de759630e20b5fdd31dec83c3fe8ffbf51c41

  • C:\Users\Public\Documents\Seti\hptBGf\emrzEM.exe

    Filesize

    24KB

    MD5

    81a2792087ebdd38b3c4f36888ad78c1

    SHA1

    335a706754087bc7dcf84bbe9fcc16a088d8ba4b

    SHA256

    5e7758a0e2153727040091d6dbb2da98eff4c4993bf84f0008faf7574973978d

    SHA512

    5e7daf7e9eede820d23492c1b78772dc4b9c16b9ca3e46a8c41ffa19c9f86e6ca7441f22a1d852189e97e02eb534e2a20e0a7a821971321c4d6e959e032e8db3

  • \Users\Public\Documents\Seti\hptBGf\emrzEM.exe

    Filesize

    24KB

    MD5

    81a2792087ebdd38b3c4f36888ad78c1

    SHA1

    335a706754087bc7dcf84bbe9fcc16a088d8ba4b

    SHA256

    5e7758a0e2153727040091d6dbb2da98eff4c4993bf84f0008faf7574973978d

    SHA512

    5e7daf7e9eede820d23492c1b78772dc4b9c16b9ca3e46a8c41ffa19c9f86e6ca7441f22a1d852189e97e02eb534e2a20e0a7a821971321c4d6e959e032e8db3

  • memory/1824-68-0x00000000020D0000-0x00000000020E2000-memory.dmp

    Filesize

    72KB

  • memory/1824-60-0x00000000757D0000-0x00000000757D1000-memory.dmp

    Filesize

    4KB

  • memory/1824-54-0x0000000077A40000-0x0000000077A41000-memory.dmp

    Filesize

    4KB

  • memory/1824-75-0x0000000077A40000-0x0000000077A41000-memory.dmp

    Filesize

    4KB

  • memory/1824-83-0x0000000000400000-0x00000000005B0000-memory.dmp

    Filesize

    1.7MB

  • memory/1824-88-0x0000000010000000-0x0000000010046000-memory.dmp

    Filesize

    280KB

  • memory/1824-59-0x0000000000400000-0x00000000005B0000-memory.dmp

    Filesize

    1.7MB

  • memory/1824-106-0x0000000003180000-0x0000000003192000-memory.dmp

    Filesize

    72KB

  • memory/1824-58-0x0000000000400000-0x00000000005B0000-memory.dmp

    Filesize

    1.7MB

  • memory/1824-57-0x00000000757D0000-0x00000000757D1000-memory.dmp

    Filesize

    4KB

  • memory/1824-55-0x0000000077A40000-0x0000000077A41000-memory.dmp

    Filesize

    4KB