Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:02
Behavioral task
behavioral1
Sample
㶮.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
㶮.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
㶮.exe
-
Size
1.3MB
-
MD5
c968a7435252b03172f3ce2203d2cb3f
-
SHA1
6a82d3c7562f44a2a154640145034ea0977c1484
-
SHA256
14c5d6b1a0b1eef488240bc71d2011dead947721dd73de1591dfedf145e481cf
-
SHA512
763534e570494408104008016cd354e2dbb91e8aad043807d84e1a789f47517bd09742916ea1e9b17619c7c0cb424d443f7a6a8e43ca2414c4dfa547b559a3b7
-
SSDEEP
24576:w5q9mwQVKgUT1EIAThEi1r5alT96sJokqI/Zv7d6TUeLOPJZi:w5q4ygUTixh/569CI/ZjJea/i
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1364-0-0x0000000000400000-0x0000000000735000-memory.dmp vmprotect behavioral1/memory/1364-10-0x0000000000400000-0x0000000000735000-memory.dmp vmprotect behavioral1/memory/1364-15-0x0000000000400000-0x0000000000735000-memory.dmp vmprotect behavioral1/memory/1364-16-0x0000000000400000-0x0000000000735000-memory.dmp vmprotect -
Drops file in Program Files directory 1 IoCs
Processes:
㶮.exedescription ioc process File created C:\Program Files\Internet Explorer\nvudp.exe 㶮.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
㶮.exepid process 1364 㶮.exe 1364 㶮.exe 1364 㶮.exe 1364 㶮.exe 1364 㶮.exe 1364 㶮.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
㶮.exepid process 1364 㶮.exe 1364 㶮.exe