Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 23:21

General

  • Target

    fa4612310415dd7deece74c25a106723e026e9823ce84bb642e77f75ee50ef57.exe

  • Size

    8.2MB

  • MD5

    7f43c3eb429ba295fd67228cb8c983d9

  • SHA1

    35fbdaf4a3786f7047e951843098582059270f21

  • SHA256

    fa4612310415dd7deece74c25a106723e026e9823ce84bb642e77f75ee50ef57

  • SHA512

    093f8932a9f971c3288590c1f4dc31bb930e8067c300ea91f1dcb681d5853c94f3a07dd6f5225791075fa4b8e28f7c8ead85d53dd9cd55cfa9a1fc4ecc0e7883

  • SSDEEP

    196608:nWTtiF4xO0Z1+5AtYHGIn9uweL7o+JktFvvvZb36M:Km4xP+OY9udLs+KtZvJj

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa4612310415dd7deece74c25a106723e026e9823ce84bb642e77f75ee50ef57.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4612310415dd7deece74c25a106723e026e9823ce84bb642e77f75ee50ef57.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2972-0-0x0000000001800000-0x0000000001EF7000-memory.dmp

    Filesize

    7.0MB

  • memory/2972-7-0x00000000760B0000-0x00000000760B1000-memory.dmp

    Filesize

    4KB

  • memory/2972-3-0x0000000077DA0000-0x0000000077DA1000-memory.dmp

    Filesize

    4KB

  • memory/2972-1-0x0000000077DA0000-0x0000000077DA1000-memory.dmp

    Filesize

    4KB

  • memory/2972-9-0x0000000001800000-0x0000000001EF7000-memory.dmp

    Filesize

    7.0MB

  • memory/2972-11-0x00000000002C0000-0x00000000002D2000-memory.dmp

    Filesize

    72KB

  • memory/2972-13-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2972-12-0x0000000077DA0000-0x0000000077DA1000-memory.dmp

    Filesize

    4KB

  • memory/2972-14-0x0000000001800000-0x0000000001EF7000-memory.dmp

    Filesize

    7.0MB