Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2023, 00:02

General

  • Target

    6c90e24eb13acf75f44db77c54163eb997f96a5d14734b85fd93c71af54b0a35.exe

  • Size

    13.7MB

  • MD5

    9831f4b7926f13c362557437000ca2ba

  • SHA1

    1b05a2497c2c803ea9227196d71f69d56bb9ae47

  • SHA256

    6c90e24eb13acf75f44db77c54163eb997f96a5d14734b85fd93c71af54b0a35

  • SHA512

    04bf153632b28eb96c2dca41b37d39893b5307acae6b439d2b07c8a1d2249cbded34c57f0c3cd3fb76f0eb1f70f72cec3cfa7af3caa71c8aff9942a9f7597ec3

  • SSDEEP

    393216:dgsS01a0AQLjdJVPgMIi4ND0vGIYVlHWeEsExGf:xS01a0AQvhv4NKYfHxE38f

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c90e24eb13acf75f44db77c54163eb997f96a5d14734b85fd93c71af54b0a35.exe
    "C:\Users\Admin\AppData\Local\Temp\6c90e24eb13acf75f44db77c54163eb997f96a5d14734b85fd93c71af54b0a35.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4492-0-0x0000000002080000-0x0000000002081000-memory.dmp

    Filesize

    4KB

  • memory/4492-2-0x00000000020A0000-0x00000000020A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-1-0x0000000002090000-0x0000000002091000-memory.dmp

    Filesize

    4KB

  • memory/4492-3-0x00000000037F0000-0x00000000037F1000-memory.dmp

    Filesize

    4KB

  • memory/4492-5-0x0000000003800000-0x0000000003801000-memory.dmp

    Filesize

    4KB

  • memory/4492-4-0x0000000000400000-0x000000000191C000-memory.dmp

    Filesize

    21.1MB

  • memory/4492-6-0x0000000003810000-0x0000000003811000-memory.dmp

    Filesize

    4KB

  • memory/4492-7-0x0000000003820000-0x0000000003821000-memory.dmp

    Filesize

    4KB

  • memory/4492-12-0x0000000000400000-0x000000000191C000-memory.dmp

    Filesize

    21.1MB

  • memory/4492-13-0x0000000000400000-0x000000000191C000-memory.dmp

    Filesize

    21.1MB