Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2024, 17:36

General

  • Target

    6fe6dd54bcace1aff1a5903288c11f3e.exe

  • Size

    3.7MB

  • MD5

    6fe6dd54bcace1aff1a5903288c11f3e

  • SHA1

    133d97c403da2a15a51705932941aeafaa98b256

  • SHA256

    222745facca65004689cc6fa5f3cd6ce931e86928e00dc555315aea72fac1e86

  • SHA512

    6f8453b054e1a67aff11ad1804a3847a2040875ef112f7ff58fccf7d3ba23e2cb26420e1c2d30df1038d65f15ca7f5dc94f2222ae495067a04d9a89f4d592ffb

  • SSDEEP

    98304:L8RB7+lrZU6mNEP4WMgrj4sGo3lOXg/HmwqNo3YIQJzeAAnq:LS78rZU6mSNMAMsbxOjmoIQJzeAMq

Score
7/10

Malware Config

Signatures

  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fe6dd54bcace1aff1a5903288c11f3e.exe
    "C:\Users\Admin\AppData\Local\Temp\6fe6dd54bcace1aff1a5903288c11f3e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1668-1-0x0000000002920000-0x00000000029FF000-memory.dmp

    Filesize

    892KB

  • memory/1668-0-0x0000000002A00000-0x0000000002A01000-memory.dmp

    Filesize

    4KB

  • memory/1668-24-0x0000000005A30000-0x0000000005A31000-memory.dmp

    Filesize

    4KB

  • memory/1668-23-0x0000000005940000-0x0000000005941000-memory.dmp

    Filesize

    4KB

  • memory/1668-22-0x0000000005990000-0x0000000005991000-memory.dmp

    Filesize

    4KB

  • memory/1668-21-0x0000000005CE0000-0x0000000005CE2000-memory.dmp

    Filesize

    8KB

  • memory/1668-25-0x0000000005A20000-0x0000000005A21000-memory.dmp

    Filesize

    4KB

  • memory/1668-20-0x0000000004C00000-0x0000000004C01000-memory.dmp

    Filesize

    4KB

  • memory/1668-19-0x0000000005A10000-0x0000000005A11000-memory.dmp

    Filesize

    4KB

  • memory/1668-18-0x00000000059D0000-0x00000000059D1000-memory.dmp

    Filesize

    4KB

  • memory/1668-17-0x0000000005900000-0x0000000005901000-memory.dmp

    Filesize

    4KB

  • memory/1668-16-0x0000000005A00000-0x0000000005A01000-memory.dmp

    Filesize

    4KB

  • memory/1668-15-0x0000000005980000-0x0000000005981000-memory.dmp

    Filesize

    4KB

  • memory/1668-14-0x0000000005910000-0x0000000005911000-memory.dmp

    Filesize

    4KB

  • memory/1668-13-0x00000000059C0000-0x00000000059C1000-memory.dmp

    Filesize

    4KB

  • memory/1668-12-0x0000000005920000-0x0000000005921000-memory.dmp

    Filesize

    4KB

  • memory/1668-11-0x0000000005960000-0x0000000005961000-memory.dmp

    Filesize

    4KB

  • memory/1668-10-0x0000000005970000-0x0000000005971000-memory.dmp

    Filesize

    4KB

  • memory/1668-9-0x0000000005950000-0x0000000005951000-memory.dmp

    Filesize

    4KB

  • memory/1668-8-0x0000000005860000-0x0000000005861000-memory.dmp

    Filesize

    4KB

  • memory/1668-7-0x00000000058D0000-0x00000000058D1000-memory.dmp

    Filesize

    4KB

  • memory/1668-6-0x0000000005870000-0x0000000005871000-memory.dmp

    Filesize

    4KB

  • memory/1668-5-0x0000000005880000-0x0000000005882000-memory.dmp

    Filesize

    8KB

  • memory/1668-4-0x00000000058C0000-0x00000000058C1000-memory.dmp

    Filesize

    4KB

  • memory/1668-3-0x00000000058E0000-0x00000000058E1000-memory.dmp

    Filesize

    4KB

  • memory/1668-2-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-27-0x00000000058F0000-0x00000000058F1000-memory.dmp

    Filesize

    4KB

  • memory/1668-26-0x00000000058B0000-0x00000000058B1000-memory.dmp

    Filesize

    4KB

  • memory/1668-28-0x0000000005BF0000-0x0000000005BF2000-memory.dmp

    Filesize

    8KB

  • memory/1668-29-0x00000000059E0000-0x00000000059E1000-memory.dmp

    Filesize

    4KB

  • memory/1668-30-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-31-0x0000000002A00000-0x0000000002A01000-memory.dmp

    Filesize

    4KB

  • memory/1668-32-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-33-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-34-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-35-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-36-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-37-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-38-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-39-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-40-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-41-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-42-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-43-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-44-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB

  • memory/1668-45-0x0000000000400000-0x00000000011E1000-memory.dmp

    Filesize

    13.9MB