Analysis

  • max time kernel
    126s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 23:48

General

  • Target

    5ae6069043fb807a89687612be2924466105994f5ef707e0852f5fae8f8e465b.exe

  • Size

    12.8MB

  • MD5

    cc6c2ac4b640dce70c2c38756e3a42aa

  • SHA1

    d8553f3031711253f767cc163e7ec7b07f3d085f

  • SHA256

    5ae6069043fb807a89687612be2924466105994f5ef707e0852f5fae8f8e465b

  • SHA512

    80cb88aa59151fec5433df0ffaad5dd2eeecbde74a9fa601a572469a7b72d1158a9df3fa6d4b18e95c9eddd53c9bbbc319bc2f31f42bad08b7caf268952e9686

  • SSDEEP

    196608:HxlL1jlMZmNAfkIPJdwRbGMc9gLmb3s5Xjebzu2fba3TKzzJ59ZdQ8+0vbi:7L1jlMYqfHJdZMEg6bHu2TeT271bi

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4052
  • C:\Users\Admin\AppData\Local\Temp\5ae6069043fb807a89687612be2924466105994f5ef707e0852f5fae8f8e465b.exe
    "C:\Users\Admin\AppData\Local\Temp\5ae6069043fb807a89687612be2924466105994f5ef707e0852f5fae8f8e465b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color 1B
      2⤵
        PID:3016

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4052-0-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB

    • memory/4052-1-0x00000276E4240000-0x00000276E4241000-memory.dmp

      Filesize

      4KB

    • memory/4052-2-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB

    • memory/4052-6-0x00007FFE6BD20000-0x00007FFE6BD22000-memory.dmp

      Filesize

      8KB

    • memory/4052-5-0x00007FFE6BD10000-0x00007FFE6BD12000-memory.dmp

      Filesize

      8KB

    • memory/4052-7-0x00007FFE6AF40000-0x00007FFE6AF42000-memory.dmp

      Filesize

      8KB

    • memory/4052-8-0x00007FFE6AF50000-0x00007FFE6AF52000-memory.dmp

      Filesize

      8KB

    • memory/4052-10-0x00007FFE69930000-0x00007FFE69932000-memory.dmp

      Filesize

      8KB

    • memory/4052-9-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB

    • memory/4052-11-0x00007FFE69940000-0x00007FFE69942000-memory.dmp

      Filesize

      8KB

    • memory/4052-13-0x00007FFE6BD30000-0x00007FFE6BD32000-memory.dmp

      Filesize

      8KB

    • memory/4052-14-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB

    • memory/4052-19-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB

    • memory/4052-21-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB

    • memory/4052-24-0x00000276E29B0000-0x00000276E4225000-memory.dmp

      Filesize

      24.5MB