Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 09:07

General

  • Target

    d9a8b16c46fbf19f03ca377d76853f9ee746880fa3b2707b503298d4e111971f.exe

  • Size

    5.8MB

  • MD5

    462907ed326c090e5fbc844bc2cc88da

  • SHA1

    10cfdc9b5ebcca193d488821f192d324abe95700

  • SHA256

    d9a8b16c46fbf19f03ca377d76853f9ee746880fa3b2707b503298d4e111971f

  • SHA512

    70186968b9b554f9ae48ebc96adeb8d8ccfef1d7d08fd3b6c9b4582e81e42bfdcdcb8834bac7ba01ed53f4188114e26548fd80e48f07b68acf74408014230911

  • SSDEEP

    98304:jS+/YQgi3VhKiO/nMYdFRrfLpLv0yutIblRyKVQ0PbS6HQV+lFLkMxGkjJY1Pe2B:z/Tgi3VhKVn1ZfLpSIQ0PbFQOYi7jOP/

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9a8b16c46fbf19f03ca377d76853f9ee746880fa3b2707b503298d4e111971f.exe
    "C:\Users\Admin\AppData\Local\Temp\d9a8b16c46fbf19f03ca377d76853f9ee746880fa3b2707b503298d4e111971f.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2992-0-0x0000000000400000-0x0000000001013000-memory.dmp

    Filesize

    12.1MB

  • memory/2992-1-0x00000000779C0000-0x00000000779C1000-memory.dmp

    Filesize

    4KB

  • memory/2992-3-0x0000000000400000-0x0000000001013000-memory.dmp

    Filesize

    12.1MB

  • memory/2992-4-0x00000000779C0000-0x00000000779C1000-memory.dmp

    Filesize

    4KB

  • memory/2992-8-0x0000000076800000-0x0000000076801000-memory.dmp

    Filesize

    4KB

  • memory/2992-12-0x0000000076800000-0x0000000076801000-memory.dmp

    Filesize

    4KB

  • memory/2992-13-0x00000000779C0000-0x00000000779C1000-memory.dmp

    Filesize

    4KB

  • memory/2992-14-0x0000000000400000-0x0000000001013000-memory.dmp

    Filesize

    12.1MB

  • memory/2992-15-0x0000000000400000-0x0000000001013000-memory.dmp

    Filesize

    12.1MB