Analysis

  • max time kernel
    33s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 02:53

General

  • Target

    VixenFree.exe

  • Size

    5.0MB

  • MD5

    d01b973626d00211d1b261d8f3ddd52e

  • SHA1

    bc39e4337fa6b8e8858f394c21c7daaf82ab6e01

  • SHA256

    f0ce3f4bc62c51f8c5a778a37053c004243e844b0d76689279c5b0b5795929b2

  • SHA512

    569a437c36dfefd9f130608178caafbc3ce4f24d1fb797f1245b470c480473d4fb77550e98fab3614734e5da7ce613856667afdc01a15fe93c79b86c7a0f3bbd

  • SSDEEP

    98304:R+JOLQFh3L9BUu7jTetDhKQA+uNr/vjpbO1YYpagMp5s+M0GkXUFM8:R+J3JWu7jQDvuF/vjp4YAf+MJJ

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VixenFree.exe
    "C:\Users\Admin\AppData\Local\Temp\VixenFree.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1120

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1120-0-0x000000014004D000-0x0000000140378000-memory.dmp

    Filesize

    3.2MB

  • memory/1120-1-0x00007FF907510000-0x00007FF907512000-memory.dmp

    Filesize

    8KB

  • memory/1120-2-0x00007FF907520000-0x00007FF907522000-memory.dmp

    Filesize

    8KB

  • memory/1120-6-0x0000000140000000-0x0000000140871000-memory.dmp

    Filesize

    8.4MB

  • memory/1120-7-0x000000014004D000-0x0000000140378000-memory.dmp

    Filesize

    3.2MB

  • memory/1120-8-0x0000000140000000-0x0000000140871000-memory.dmp

    Filesize

    8.4MB