Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 22:25

General

  • Target

    K3_RISE_V12.3_KEYGEN/R123KeyGen(VIP)V1.2.exe

  • Size

    1.1MB

  • MD5

    34e0a21c41a4d87f62f0f9cc5a056f86

  • SHA1

    0b67356eee8cf21d96d784c4eb20daa522dbf2a1

  • SHA256

    e5774c3fbb375047bada45ca6301c736c37bb35fb5498a2fbcfb74d65e6e07d3

  • SHA512

    e9f6baded170e1f4d8fbe0dbfa70db32f075494544dc41089564bd295bc8704f9033f8973efdb70b2344afff56cdb9914057b3e04505cd17e56d9108f88b116d

  • SSDEEP

    24576:apt3GJcdpUtddoPYcYp4ktRdXkBsXPYRH8vo2ypPqd7oK:+t2+UBbduRH8vo2ypyd0

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\K3_RISE_V12.3_KEYGEN\R123KeyGen(VIP)V1.2.exe
    "C:\Users\Admin\AppData\Local\Temp\K3_RISE_V12.3_KEYGEN\R123KeyGen(VIP)V1.2.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4736-0-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-1-0x000000000085B000-0x000000000090D000-memory.dmp

    Filesize

    712KB

  • memory/4736-2-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-3-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-4-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-5-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-6-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-7-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-8-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-9-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-10-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-11-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-12-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-13-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-14-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-15-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-16-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB

  • memory/4736-17-0x0000000000400000-0x000000000090D000-memory.dmp

    Filesize

    5.1MB