Analysis

  • max time kernel
    131s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 14:40

General

  • Target

    AntiVm.exe

  • Size

    35KB

  • MD5

    4563b06ed7e8526129b2e8ec9206fc30

  • SHA1

    03453f4649f10dbacdf7c81cc5cf9f67f91f3f9b

  • SHA256

    fd0fb5e8e3dda715720273b30bb3948884287e2251ff9e293e4f1603baf7f773

  • SHA512

    da3426baea52d6cf505d9279ec9e536fcd53b7a873c853515e894836c305a3912a0501ffbd52eaf81c0f1802bc5bc729a09e477a03a186ae258cc89c50bbe052

  • SSDEEP

    384:vrDSgYShqrV4jKb1hbcRqI1viLwPxvaATxB4UFu/10AXPGCGHZOVPJ/kRK1rbGjb:rYyuzS18gbXy6Zcx/QKhtPX/0sCp7GK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AntiVm.exe
    "C:\Users\Admin\AppData\Local\Temp\AntiVm.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic diskdrive get model
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3828
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads