Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2023, 09:27

General

  • Target

    14b9632e1f07466a85668e5be3b07dcab043b8a2bb5fc04550f3526ee09990dc.exe

  • Size

    6.0MB

  • MD5

    bc0fe55c4618d0d6dbee7e4f696f7d60

  • SHA1

    ec9a5162a2c4b5b9a5435e30d3ad3179c07c8349

  • SHA256

    14b9632e1f07466a85668e5be3b07dcab043b8a2bb5fc04550f3526ee09990dc

  • SHA512

    b2b4e66a4f3f294c145595477ccdab6f623c71085cb73c816b10663890d6a7c067bed756c94848b3e814bb2846b8a554575c5e74defa8f99140a5c6a9455eb97

  • SSDEEP

    98304:G4t6f/8pTrtl60yo7MSR33BsrUZkq8qbBzha1UREzjT7WewCAoLImRMqfr0vTDZy:G4t638hrrnyo7MSd3sskq8CzhaQIRH9p

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b9632e1f07466a85668e5be3b07dcab043b8a2bb5fc04550f3526ee09990dc.exe
    "C:\Users\Admin\AppData\Local\Temp\14b9632e1f07466a85668e5be3b07dcab043b8a2bb5fc04550f3526ee09990dc.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im "Among Us.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:5084
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:2512
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3304

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3304-57-0x000001DB3D040000-0x000001DB3D041000-memory.dmp

            Filesize

            4KB

          • memory/3304-58-0x000001DB3D030000-0x000001DB3D031000-memory.dmp

            Filesize

            4KB

          • memory/3304-82-0x000001DB3D290000-0x000001DB3D291000-memory.dmp

            Filesize

            4KB

          • memory/3304-81-0x000001DB3D180000-0x000001DB3D181000-memory.dmp

            Filesize

            4KB

          • memory/3304-80-0x000001DB3D180000-0x000001DB3D181000-memory.dmp

            Filesize

            4KB

          • memory/3304-78-0x000001DB3D170000-0x000001DB3D171000-memory.dmp

            Filesize

            4KB

          • memory/3304-66-0x000001DB3CF70000-0x000001DB3CF71000-memory.dmp

            Filesize

            4KB

          • memory/3304-63-0x000001DB3D030000-0x000001DB3D031000-memory.dmp

            Filesize

            4KB

          • memory/3304-60-0x000001DB3D040000-0x000001DB3D041000-memory.dmp

            Filesize

            4KB

          • memory/3304-51-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-56-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-14-0x000001DB34D40000-0x000001DB34D50000-memory.dmp

            Filesize

            64KB

          • memory/3304-30-0x000001DB34E40000-0x000001DB34E50000-memory.dmp

            Filesize

            64KB

          • memory/3304-46-0x000001DB3D3F0000-0x000001DB3D3F1000-memory.dmp

            Filesize

            4KB

          • memory/3304-47-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-48-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-55-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-50-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-49-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-52-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-53-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/3304-54-0x000001DB3D420000-0x000001DB3D421000-memory.dmp

            Filesize

            4KB

          • memory/4628-1-0x0000000000F60000-0x0000000000F61000-memory.dmp

            Filesize

            4KB

          • memory/4628-13-0x0000000000400000-0x0000000000F08000-memory.dmp

            Filesize

            11.0MB

          • memory/4628-0-0x0000000000400000-0x0000000000F08000-memory.dmp

            Filesize

            11.0MB

          • memory/4628-9-0x0000000002E10000-0x0000000002E11000-memory.dmp

            Filesize

            4KB

          • memory/4628-8-0x0000000002E00000-0x0000000002E01000-memory.dmp

            Filesize

            4KB

          • memory/4628-6-0x0000000002DE0000-0x0000000002DE1000-memory.dmp

            Filesize

            4KB

          • memory/4628-7-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

            Filesize

            4KB

          • memory/4628-3-0x0000000001680000-0x0000000001681000-memory.dmp

            Filesize

            4KB

          • memory/4628-4-0x0000000000400000-0x0000000000F08000-memory.dmp

            Filesize

            11.0MB

          • memory/4628-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

            Filesize

            4KB

          • memory/4628-2-0x0000000001670000-0x0000000001671000-memory.dmp

            Filesize

            4KB