Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 09:38
General
-
Target
Injector.vmp.exe
-
Size
5.2MB
-
MD5
9a32db864e91508d0487098e408c03b2
-
SHA1
1f3befbb6a1d89aded7130126419860a1e69229a
-
SHA256
f3c6f08d0e2fe784832aa77c0c5f83a31b5832d4ad53fecd87a1b188fb6678bf
-
SHA512
f27e5bf2e239f881408ee37abac6bf75123f7a33d01df30268a49032e5a592648de05aadb4fd3889c5fc095e91efd343b03db11c5c2e731153fd2d55f0f096b5
-
SSDEEP
98304:FrwXhpBQoM3DZyv0BGhhU6d5QpJpCJHw9fjPzWiDmnEPScKLFH7q:RwxvQoOEaGc6zVJw6iqnEPmLF7q
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1508-1-0x0000000000400000-0x0000000000C64000-memory.dmp vmprotect behavioral1/memory/1508-4-0x0000000000400000-0x0000000000C64000-memory.dmp vmprotect behavioral1/memory/1508-5-0x0000000000400000-0x0000000000C64000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Injector.vmp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1508 Injector.vmp.exe 1508 Injector.vmp.exe 1508 Injector.vmp.exe 1508 Injector.vmp.exe