Analysis

  • max time kernel
    39s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:45

General

  • Target

    VMProtect.exe

  • Size

    22.4MB

  • MD5

    c7f3f260e3d99a9db927624504d87f27

  • SHA1

    8c2d60bfef641317630534fac8887f30505a2148

  • SHA256

    6bd55db87891350e05715c0af647817cc26e5cf59f8664bbfbd514d430a51722

  • SHA512

    4a70edd18ab913608f92d4c5a4545169e11705fd5c78450756f9db724890ebb862dfb03853d52f612069aa9b1004f232b66b865b6e9f3ae50438c135eacd5152

  • SSDEEP

    393216:9yjMMZcC7VCSBn253w4KdGYhSRJ5AGhjL75fl7YKO+U3rn/a/MkCy6cWIKAPc:9yjMMZsSMRNKPIf+GlLF2+yrnCUkWGk

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VMProtect.exe
    "C:\Users\Admin\AppData\Local\Temp\VMProtect.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2112-0-0x0000000077C00000-0x0000000077C02000-memory.dmp
    Filesize

    8KB

  • memory/2112-2-0x0000000077C00000-0x0000000077C02000-memory.dmp
    Filesize

    8KB

  • memory/2112-4-0x0000000077C00000-0x0000000077C02000-memory.dmp
    Filesize

    8KB

  • memory/2112-6-0x0000000077A50000-0x0000000077BF9000-memory.dmp
    Filesize

    1.7MB

  • memory/2112-5-0x0000000077C20000-0x0000000077C22000-memory.dmp
    Filesize

    8KB

  • memory/2112-8-0x0000000077C20000-0x0000000077C22000-memory.dmp
    Filesize

    8KB

  • memory/2112-10-0x0000000077C20000-0x0000000077C22000-memory.dmp
    Filesize

    8KB

  • memory/2112-11-0x000000013FF90000-0x00000001440A7000-memory.dmp
    Filesize

    65.1MB

  • memory/2112-15-0x0000000077A50000-0x0000000077BF9000-memory.dmp
    Filesize

    1.7MB