Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2024 06:39

General

  • Target

    VTFEdit Reloaded.exe

  • Size

    1.3MB

  • MD5

    ed102d50f2a26abb5eb242158d55e558

  • SHA1

    4f5e2664629c0aa3b799ca5741ce558a3f27201e

  • SHA256

    1eb98183ea64f6253d66a915e4b976ac6e382ce5b88955838d8d389fc9f97634

  • SHA512

    1f74fbeffaf65173d6e663ac7992fdb87ab7c3a127d3ff7bd160e9cd1d6406951ac583fe9c62f6b5be5bce5df9837fb8a313f8e9f34d834f28704fe05519340e

  • SSDEEP

    12288:R+hE38/1qzbpc5+Z28/1qzbz8/1qzb18/1qzbKJ78/1qzbz8/1qzbS65qdGOSP8i:RA6N626g6su626z5sS66B

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VTFEdit Reloaded.exe
    "C:\Users\Admin\AppData\Local\Temp\VTFEdit Reloaded.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-0-0x000000013FE00000-0x000000013FF59000-memory.dmp

    Filesize

    1.3MB

  • memory/2196-1-0x000000001EC20000-0x000000001EC30000-memory.dmp

    Filesize

    64KB