Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 03:05

General

  • Target

    62429500da99c06c7338559add995e579e83a90eaca4ec74fe128a926589d45b.exe

  • Size

    7.3MB

  • MD5

    8972594a3d0059382369b047c74aa69d

  • SHA1

    dca5955d9c3f630c284fb14b956def3d0d58d996

  • SHA256

    62429500da99c06c7338559add995e579e83a90eaca4ec74fe128a926589d45b

  • SHA512

    599ae9e22bdbc101d05ecd0d23641d00b1cea4b0c99b1602fddb8e454cd4e2cd09166f20607cffeb126f47e067f7bb73508acefe0226c74a6905e55104ceab82

  • SSDEEP

    196608:2qBTzm8IPkAv0j7sCW/YCtxju4bcaJyubQgwc+wlnq:vlm1PkAMfsCWACzqv8yuiS

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62429500da99c06c7338559add995e579e83a90eaca4ec74fe128a926589d45b.exe
    "C:\Users\Admin\AppData\Local\Temp\62429500da99c06c7338559add995e579e83a90eaca4ec74fe128a926589d45b.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/856-0-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/856-3-0x0000000000400000-0x0000000001320000-memory.dmp

    Filesize

    15.1MB

  • memory/856-2-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/856-6-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/856-7-0x0000000000400000-0x0000000001320000-memory.dmp

    Filesize

    15.1MB

  • memory/856-9-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/856-5-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/856-11-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/856-14-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/856-16-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/856-31-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/856-29-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/856-34-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/856-32-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/856-26-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/856-24-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/856-21-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/856-19-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/856-36-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/856-37-0x0000000077DB0000-0x0000000077DB1000-memory.dmp

    Filesize

    4KB

  • memory/856-41-0x0000000000400000-0x0000000001320000-memory.dmp

    Filesize

    15.1MB