Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:45

General

  • Target

    VMProtect.exe

  • Size

    22.4MB

  • MD5

    c7f3f260e3d99a9db927624504d87f27

  • SHA1

    8c2d60bfef641317630534fac8887f30505a2148

  • SHA256

    6bd55db87891350e05715c0af647817cc26e5cf59f8664bbfbd514d430a51722

  • SHA512

    4a70edd18ab913608f92d4c5a4545169e11705fd5c78450756f9db724890ebb862dfb03853d52f612069aa9b1004f232b66b865b6e9f3ae50438c135eacd5152

  • SSDEEP

    393216:9yjMMZcC7VCSBn253w4KdGYhSRJ5AGhjL75fl7YKO+U3rn/a/MkCy6cWIKAPc:9yjMMZsSMRNKPIf+GlLF2+yrnCUkWGk

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VMProtect.exe
    "C:\Users\Admin\AppData\Local\Temp\VMProtect.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3832-1-0x00007FF84BD40000-0x00007FF84BD42000-memory.dmp
    Filesize

    8KB

  • memory/3832-0-0x00007FF84BD30000-0x00007FF84BD32000-memory.dmp
    Filesize

    8KB

  • memory/3832-2-0x00007FF6C3D10000-0x00007FF6C7E27000-memory.dmp
    Filesize

    65.1MB