Analysis

  • max time kernel
    139s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2023 16:43

General

  • Target

    a4cc0172ebb869a59a8a716e01e8c093c973d292f7e33e79cecb77e5268fb325.exe

  • Size

    5.8MB

  • MD5

    d506ffd3449cdfd53bd5e2c38a12e760

  • SHA1

    6da21e4134ca8f124944c6fd79e4d102e45b9750

  • SHA256

    a4cc0172ebb869a59a8a716e01e8c093c973d292f7e33e79cecb77e5268fb325

  • SHA512

    a7c494b0bd843185f1398113e16a8fe50c460e747743e5b1ed746fe8058135f02b80eae71aff2a27eb8b43c95445c9ae8439c793f58f402e9909332e52c49827

  • SSDEEP

    98304:xtJ/zFzPOCEszSKpOmGiYWjZ9gTMtNmny0MFGpVwgbtSd/159HauqaIfnagkFFJQ:xNzPOCEsHY4+MvmfWAVwgbtS11bauqal

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4cc0172ebb869a59a8a716e01e8c093c973d292f7e33e79cecb77e5268fb325.exe
    "C:\Users\Admin\AppData\Local\Temp\a4cc0172ebb869a59a8a716e01e8c093c973d292f7e33e79cecb77e5268fb325.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3288-0-0x0000000000400000-0x0000000000EF9000-memory.dmp

    Filesize

    11.0MB

  • memory/3288-1-0x0000000001190000-0x0000000001191000-memory.dmp

    Filesize

    4KB

  • memory/3288-2-0x0000000001670000-0x0000000001671000-memory.dmp

    Filesize

    4KB

  • memory/3288-4-0x0000000000400000-0x0000000000EF9000-memory.dmp

    Filesize

    11.0MB

  • memory/3288-7-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

    Filesize

    4KB

  • memory/3288-5-0x00000000016B0000-0x00000000016B1000-memory.dmp

    Filesize

    4KB

  • memory/3288-3-0x00000000016A0000-0x00000000016A1000-memory.dmp

    Filesize

    4KB

  • memory/3288-6-0x0000000002DE0000-0x0000000002DE1000-memory.dmp

    Filesize

    4KB

  • memory/3288-8-0x0000000002E00000-0x0000000002E01000-memory.dmp

    Filesize

    4KB

  • memory/3288-9-0x0000000002E10000-0x0000000002E11000-memory.dmp

    Filesize

    4KB

  • memory/3288-13-0x0000000000400000-0x0000000000EF9000-memory.dmp

    Filesize

    11.0MB