Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 00:18

General

  • Target

    340742a1ee261c29ba561bfdd8f33bdc.exe

  • Size

    5.5MB

  • MD5

    340742a1ee261c29ba561bfdd8f33bdc

  • SHA1

    e4a0f2399e57ac6d5240f801403c2dcf1f124f81

  • SHA256

    977673be710af439b978e63775417ac3023e4485965f77771aaa3262c1815f56

  • SHA512

    6a6efb721d5dd9c6102aea4c8183af4b6dea1579722036ae881399e10c9599f236adcf0df6268f1054531dd43a4ebfc640a576ea61c43118a3044a458b0c0932

  • SSDEEP

    98304:Rleg6qfyOpgGSZIh4J6ZBPTqnC47vhalyNRWVYor9HRWXS:SovUvEZBPTmC41WPr9

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\340742a1ee261c29ba561bfdd8f33bdc.exe
    "C:\Users\Admin\AppData\Local\Temp\340742a1ee261c29ba561bfdd8f33bdc.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4532

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4532-2-0x00007FFE30600000-0x00007FFE30602000-memory.dmp

          Filesize

          8KB

        • memory/4532-3-0x00007FF743090000-0x00007FF7439E3000-memory.dmp

          Filesize

          9.3MB

        • memory/4532-0-0x00007FF743090000-0x00007FF7439E3000-memory.dmp

          Filesize

          9.3MB

        • memory/4532-1-0x00007FFE305F0000-0x00007FFE305F2000-memory.dmp

          Filesize

          8KB

        • memory/4532-6-0x00007FF743090000-0x00007FF7439E3000-memory.dmp

          Filesize

          9.3MB