Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 23:51

General

  • Target

    ejlalsjdlajldkada.exe

  • Size

    2.6MB

  • MD5

    a7721c85a645f130008d6698c5510104

  • SHA1

    f9ee42ec7d54400fac1e38256750cf89dfd86fef

  • SHA256

    81a8728f9318bc34a746347042b564d8832e00a29c3a1a739a7909ddeff77681

  • SHA512

    f726ccbf292a2e129068de7f363a1466d25ed78333d0fdd8a4c4b7f2fe7bbd42cfd0b87194010f48028f3fb1992ff6c413d633e5a22da2aebef4a38abac5daed

  • SSDEEP

    49152:IHVC5dtEpMqsJ0jbJrjSjObj/6kvs+EwkHM3KvQxxW1TAjzqTqTaP1mt9:I0EpMB0jN5SUsOkHMavQxxgT4Nsmt

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ejlalsjdlajldkada.exe
    "C:\Users\Admin\AppData\Local\Temp\ejlalsjdlajldkada.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2120

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2120-0-0x00007FF75D1F4000-0x00007FF75D47C000-memory.dmp

          Filesize

          2.5MB

        • memory/2120-1-0x00007FFD24870000-0x00007FFD24872000-memory.dmp

          Filesize

          8KB

        • memory/2120-2-0x00007FF75D1D0000-0x00007FF75D714000-memory.dmp

          Filesize

          5.3MB

        • memory/2120-5-0x00007FF75D1D0000-0x00007FF75D714000-memory.dmp

          Filesize

          5.3MB

        • memory/2120-6-0x00007FF75D1F4000-0x00007FF75D47C000-memory.dmp

          Filesize

          2.5MB

        • memory/2120-7-0x00007FF75D1D0000-0x00007FF75D714000-memory.dmp

          Filesize

          5.3MB