Resubmissions
20/07/2024, 17:01
240720-vjk4cswbkp 720/07/2024, 16:55
240720-ve8nvstgkb 720/07/2024, 16:53
240720-vedtgswamn 7Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 17:01
Behavioral task
behavioral1
Sample
RVVNfAFuoPUg.exe
Resource
win10v2004-20240704-en
5 signatures
150 seconds
General
-
Target
RVVNfAFuoPUg.exe
-
Size
20.5MB
-
MD5
e5bb4ca071b4a7f32467d4260fef5610
-
SHA1
7e950adae620544f07a3b455546e498a6ac2c4d0
-
SHA256
f9cb65c4d208ba89805850d0ea1e2d9853236ac21ad1f93a4f263f377ddd614c
-
SHA512
065cd30ca5bd18bc9d7be0c3700f1f6282b2525f59d741e3a0476d0572b4b0c90f077ecedc0aea4df7eded285948a9ebc54b8192fc2260862b9999c564ab7ca2
-
SSDEEP
393216:HNZI9KZ5ikvL+rWGtlqSfBI5xX4LH4pYZv7ugs7G2pWCL6o+DhUOvNR:U9KZ4kvqrh/hfBI5xXoH4KZviTGDaOvf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3652-22-0x0000000140000000-0x000000014296B000-memory.dmp themida behavioral1/memory/3652-24-0x0000000140000000-0x000000014296B000-memory.dmp themida behavioral1/memory/3652-26-0x0000000140000000-0x000000014296B000-memory.dmp themida behavioral1/memory/2004-44-0x0000000140000000-0x000000014296B000-memory.dmp themida behavioral1/memory/4204-65-0x0000000140000000-0x000000014296B000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3652 RVVNfAFuoPUg.exe 2004 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3652 RVVNfAFuoPUg.exe 3652 RVVNfAFuoPUg.exe 3652 RVVNfAFuoPUg.exe 3652 RVVNfAFuoPUg.exe 2004 RVVNfAFuoPUg.exe 2004 RVVNfAFuoPUg.exe 2004 RVVNfAFuoPUg.exe 2004 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3652 RVVNfAFuoPUg.exe 2004 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 RVVNfAFuoPUg.exe 4204 RVVNfAFuoPUg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3652
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2004
-
C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4204