Analysis

  • max time kernel
    91s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 06:44

General

  • Target

    VMProtect 3.8.1/VMProtect_Ext64.dll

  • Size

    226KB

  • MD5

    03f91a9f0ae86664d28c1c2267ec429b

  • SHA1

    e4c0847c62a1ee492ba48671b66b280579be3bae

  • SHA256

    06c5896b3c704061847140d439553f6d9c2f8f8bf2c74f429a668d95574097ad

  • SHA512

    ddc03634ba18cb70240b6d40cc261684340048aec9acee3d1cff05ac2909bbd7cd0bfed4fb08eb4e8494d15069850b6bc260241918010c1104cc8b16f3361a3e

  • SSDEEP

    3072:OXep6V+Hiwesaje/gwINrc1yUyhxQLFGCm8EMq:FVNaq4bkC3QLgC5q

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\VMProtect 3.8.1\VMProtect_Ext64.dll"
    1⤵
    • Modifies registry class
    PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads