Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 04:40

General

  • Target

    6624caabe9ec4c58185492839610d441.exe

  • Size

    73KB

  • MD5

    6624caabe9ec4c58185492839610d441

  • SHA1

    f0a4b9acc75a69e6878767c66327f5b38c80243d

  • SHA256

    36d2c355bcf5c8de61973d17e59bf6178c407662d58b9f9792491003ab195529

  • SHA512

    5fe243f0ace088351d63ee453192b8fc28af27845795ec44fe360cc8b3f64dba209173afe386217b0de74c77d723d2564388e46b025f9eba4a6179a7cb2250b6

  • SSDEEP

    1536:6ASVYvU/81RTl6o2GR7ulOdTW7t92tzaO4vxgidzd6:CKt1R/2GR7+7tIX4JFdx6

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6624caabe9ec4c58185492839610d441.exe
    "C:\Users\Admin\AppData\Local\Temp\6624caabe9ec4c58185492839610d441.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2228

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2228-0-0x0000000000030000-0x000000000004D000-memory.dmp

          Filesize

          116KB

        • memory/2228-197-0x0000000000030000-0x000000000004D000-memory.dmp

          Filesize

          116KB