Analysis

  • max time kernel
    71s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 14:25

General

  • Target

    VMware.Workstation.Pro.17.kg.exe

  • Size

    42KB

  • MD5

    37d211c3fc5272dfa3535ebd800f57cb

  • SHA1

    0afd9feebe27a74f03e0b4e6278fc1af07d25bcc

  • SHA256

    90874042ce8f563d41d173a095c4b808bb151ed31957f305c4ee503bba35c5f9

  • SHA512

    52d29749602c35d1772d70dec9cd43632a8cc24dc160ac7d6e352b791e361308e3841bcfd5a3417f4cb5ed3cec060c23e907e1b7caed3406a59eae24286c4a94

  • SSDEEP

    768:u37HYksVIBlx79NzSs+k571mMik1uQIt9O+XxbTGj:iYVQlx79tV+IJX/UzXxPI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VMware.Workstation.Pro.17.kg.exe
    "C:\Users\Admin\AppData\Local\Temp\VMware.Workstation.Pro.17.kg.exe"
    1⤵
      PID:5048
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RegisterConnect.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:972

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/5048-0-0x0000000000A80000-0x0000000000A98000-memory.dmp

            Filesize

            96KB

          • memory/5048-1-0x0000000000A80000-0x0000000000A98000-memory.dmp

            Filesize

            96KB

          • memory/5048-2-0x0000000000A80000-0x0000000000A98000-memory.dmp

            Filesize

            96KB