Overview
overview
7Static
static
777169.org/...��.htm
windows7-x64
377169.org/...��.htm
windows10-2004-x64
377169.org/...er.exe
windows7-x64
377169.org/...er.exe
windows10-2004-x64
377169.org/...��.url
windows7-x64
177169.org/...��.url
windows10-2004-x64
177169.org/...PE.exe
windows7-x64
377169.org/...PE.exe
windows10-2004-x64
377169.org/...er.exe
windows7-x64
377169.org/...er.exe
windows10-2004-x64
377169.org/...ct.exe
windows7-x64
777169.org/...ct.exe
windows10-2004-x64
777169.org/...��.exe
windows7-x64
577169.org/...��.exe
windows10-2004-x64
577169.org/...��.exe
windows7-x64
777169.org/...��.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 16:27
Behavioral task
behavioral1
Sample
77169.org/ɱ͡AVG-Spyware/77169.org˵.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77169.org/ɱ͡AVG-Spyware/77169.org˵.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
77169.org/ɱ͡AVG-Spyware/S-Player.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
77169.org/ɱ͡AVG-Spyware/S-Player.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
77169.org/ɱ͡AVG-Spyware/ĺڿͬ.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
77169.org/ɱ͡AVG-Spyware/ĺڿͬ.url
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/MaskPE.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/MaskPE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/hmimys-Packer.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/hmimys-Packer.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/vmprotect.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/vmprotect.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/4.1ƽ.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/4.1ƽ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
77169.org/ɱ͡AVG-Spyware/̳̹/ڿԴ��.exe
Resource
win7-20240903-en
General
-
Target
77169.org/ɱ͡AVG-Spyware/̳̹/vmprotect.exe
-
Size
1.2MB
-
MD5
30af37097ef1dc9c3ba7490b651e086e
-
SHA1
f067275926f557c6605b8b3e07b1bcbd596e503d
-
SHA256
ac519422786eabde8c0dffe71c21a29aa592e1ea1f22e9a0472d0cca671645d6
-
SHA512
6c8dee9dd957a9ff4b1c5e85616e1879e524ca751135d6392ee5677ce106da171b53508ea52ed87ec65294cfcc9f7eee0fe9c75fffa4f10b1fd9a0305963092c
-
SSDEEP
24576:qko+ikoPIW5ASChLStaMk+8TO0b4YovDDa/zedvVHoTt6y:qvLpPwLgh4P/wvVHo56
Malware Config
Signatures
-
resource yara_rule behavioral11/memory/2552-0-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral11/memory/2552-2-0x0000000000400000-0x0000000000535000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmprotect.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2552 vmprotect.exe 2552 vmprotect.exe 2552 vmprotect.exe