Analysis

  • max time kernel
    193s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 11:59

General

  • Target

    355d8e77096d20686848f800c0817844.exe

  • Size

    924KB

  • MD5

    355d8e77096d20686848f800c0817844

  • SHA1

    3d4500b77516723956e9e255fae444ef2fa371ea

  • SHA256

    e1ccb86b01d0884592e12a51fbfcd70b876d6274f2b3c9d3d3077b83a104cc0a

  • SHA512

    9f14274120f394f7a4d53c919594cae007d1d02bafed4f02eee08be01117fdf34fa683dd82075f053e08576600c7535c03f0e0bdaafa48c8a17e5b5c9731acc2

  • SSDEEP

    24576:4MKln2kagSnY7jZdlu681RfthDzMfXdforgkY:4pn2kadmfF81R1hsC

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\355d8e77096d20686848f800c0817844.exe
    "C:\Users\Admin\AppData\Local\Temp\355d8e77096d20686848f800c0817844.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url

          Filesize

          110B

          MD5

          f9fc3e4f710ea6068eccca29ed784970

          SHA1

          eb6f961e7102e3aef227b204ff4dd9563f745812

          SHA256

          1c12badabe490d7c3d63bb0187965344ce0ed923eab707e446900a9b98913fcb

          SHA512

          b2d0db7a2c4b4d4e53a8daf2caff6a0ea826133038380e5dcf8c6493417f2884ecd61f047798189a3cff13cca3b9dbe99e5a501ce5de10488b2a337389b019ed

        • C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url

          Filesize

          115B

          MD5

          514d1b59ae8925c5edea3c446ce588dd

          SHA1

          60dd675b65c7ffaac6ca731dba265a6f316a6f75

          SHA256

          6bbfe9e113e075b646ae49400657b8bb20cbab06854b38bf007ac6e15cd7b773

          SHA512

          5bf3d0f1715b445852ad184907d2161967d51cb8fe9673330438d8705502bc63e263222c43839140c613a427b0b58b297e522b3953c2543453625e01b8017253

        • memory/4296-0-0x0000000000400000-0x00000000006F0000-memory.dmp

          Filesize

          2.9MB

        • memory/4296-1-0x0000000000400000-0x00000000006F0000-memory.dmp

          Filesize

          2.9MB

        • memory/4296-2-0x0000000000400000-0x00000000006F0000-memory.dmp

          Filesize

          2.9MB

        • memory/4296-40-0x0000000000400000-0x00000000006F0000-memory.dmp

          Filesize

          2.9MB