Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 01:50
Behavioral task
behavioral1
Sample
ahk.vmp.exe
Resource
win7-20240729-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ahk.vmp.exe
Resource
win10v2004-20240802-en
6 signatures
150 seconds
General
-
Target
ahk.vmp.exe
-
Size
6.1MB
-
MD5
4d6c95c9191f22ae69df8c36b5e83484
-
SHA1
6703628bda4beaeedc09946b3c38cba9f68d2d07
-
SHA256
fa1aeb8484a3d7db1abbcd336ee44785140926c06a9ced6ef91817121885b7e4
-
SHA512
aa3cb4a677f34daa02a0a2c8e76a429f254a04e9e6a83a07582f229d001b9a387735b836d85127fb3a50425f84e10637d1e13e4a0453313bc8c7be32e3e142d1
-
SSDEEP
98304:6lXP/oi4kaxb+O39VJVABLECjeLZuSjaWj4EiuTtkkuA+2tHtj5yR:Mno9/bJ39/mBYCjMagNXzlrVy
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2080-9-0x0000000140000000-0x0000000140B23000-memory.dmp vmprotect behavioral2/memory/2080-15-0x0000000140000000-0x0000000140B23000-memory.dmp vmprotect behavioral2/memory/2080-17-0x0000000140000000-0x0000000140B23000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2080 ahk.vmp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 ahk.vmp.exe 2080 ahk.vmp.exe 2080 ahk.vmp.exe 2080 ahk.vmp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2080 ahk.vmp.exe 2080 ahk.vmp.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2080 ahk.vmp.exe 2080 ahk.vmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 ahk.vmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ahk.vmp.exe"C:\Users\Admin\AppData\Local\Temp\ahk.vmp.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2080