Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2023 21:51

General

  • Target

    b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe

  • Size

    9.1MB

  • MD5

    3757297c2b28529712c6da8e7c52d967

  • SHA1

    1160833b9ae4d2a4fe9fb90c0553181b5add88b1

  • SHA256

    b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47

  • SHA512

    7766e86e2ad351f292f08c0e5522d9f3cc858485de9d0f50b5d52f8a30b8b955c9e9648f454a77de75e8a89426c6ae5f3753292450aa55b93dea4d6301d920a7

  • SSDEEP

    196608:AeYqHzET8Wr37+YB6xe5KT8WCSTlg88iHpAEJ/mmlF4:AxqHgl+YBMUKTNjlgBivNF4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe
    "C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe
      C:\Users\Admin\AppData\Local\Temp\b67723336a316a369b150de956790917aaf156e77596ddd7fa70d9e6567a2f47.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln.dll

    Filesize

    1.0MB

    MD5

    34cb36e76c764abc9236ca2bf66130c6

    SHA1

    7ad028cce5f50bfd1468935bd54074a376abf036

    SHA256

    8502f840936147f53ea6b3ab4b6a58264cef4a8849ba5c03a613bd402a900e7b

    SHA512

    3948a6c7a9b881abc1eeac6a938b5b4c4dd61d3ad6755977b800364d6e4dcd9d7847e731f6fde4a40bb8a1d70515bd3699f53bbf0fa9658563d8695be7879a0d

  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln.dll

    Filesize

    1.0MB

    MD5

    34cb36e76c764abc9236ca2bf66130c6

    SHA1

    7ad028cce5f50bfd1468935bd54074a376abf036

    SHA256

    8502f840936147f53ea6b3ab4b6a58264cef4a8849ba5c03a613bd402a900e7b

    SHA512

    3948a6c7a9b881abc1eeac6a938b5b4c4dd61d3ad6755977b800364d6e4dcd9d7847e731f6fde4a40bb8a1d70515bd3699f53bbf0fa9658563d8695be7879a0d

  • memory/1920-17-0x00000000038C0000-0x00000000038C1000-memory.dmp

    Filesize

    4KB

  • memory/1920-26-0x0000000000400000-0x0000000001C30000-memory.dmp

    Filesize

    24.2MB

  • memory/1920-12-0x0000000001D60000-0x0000000001D61000-memory.dmp

    Filesize

    4KB

  • memory/1920-20-0x00000000038E0000-0x00000000038E1000-memory.dmp

    Filesize

    4KB

  • memory/1920-14-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/1920-18-0x00000000038D0000-0x00000000038D1000-memory.dmp

    Filesize

    4KB

  • memory/1920-13-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/1920-15-0x0000000000400000-0x0000000001C30000-memory.dmp

    Filesize

    24.2MB

  • memory/1920-16-0x00000000038B0000-0x00000000038B1000-memory.dmp

    Filesize

    4KB

  • memory/2040-3-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/2040-7-0x0000000003B30000-0x0000000003B31000-memory.dmp

    Filesize

    4KB

  • memory/2040-6-0x0000000003B20000-0x0000000003B21000-memory.dmp

    Filesize

    4KB

  • memory/2040-0-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

    Filesize

    4KB

  • memory/2040-19-0x0000000000400000-0x0000000001C30000-memory.dmp

    Filesize

    24.2MB

  • memory/2040-5-0x0000000003B10000-0x0000000003B11000-memory.dmp

    Filesize

    4KB

  • memory/2040-4-0x0000000000400000-0x0000000001C30000-memory.dmp

    Filesize

    24.2MB

  • memory/2040-2-0x0000000001E10000-0x0000000001E11000-memory.dmp

    Filesize

    4KB

  • memory/2040-1-0x0000000001E00000-0x0000000001E01000-memory.dmp

    Filesize

    4KB