Analysis

  • max time kernel
    95s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 15:52

General

  • Target

    a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe

  • Size

    9.8MB

  • MD5

    713998985d9253877d350df15b73960e

  • SHA1

    25084c650226fea6723520dfcddd7aeae3cfafeb

  • SHA256

    a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9

  • SHA512

    c3f8d6fb21b8aa9a50262c34536b3677423e19288599276068709526aa8410fe90ec748563c9f488613a4bb7bbcdfdc65cae1388f1c48c43fcb62e73bfddd3be

  • SSDEEP

    196608:Hyu91Hc3U2aFFSmAxz0J3I4Oo19wOZn3rUnLw8J51SHDi0:Suv/dAxo3fdZnALw8vkDl

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
    "C:\Users\Admin\AppData\Local\Temp\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\careueyes\setting_v2.dat

    Filesize

    3KB

    MD5

    dc64bb93c17e29195c39ab8022fdf32c

    SHA1

    d236bfa7377710b71355268243a042832e78384f

    SHA256

    cfcd3abe6f7893a0f132966afa2a32ec0e54d0e38f4b3dc97e8de7055fabeb20

    SHA512

    7c7588861bcca16ec11d1b455b0713c33feae42c15d334b2ad80262415c204c7617aae2df0b89bc862590d698be4906a732e2ca9549f2d33ec7b3519e992d348

  • memory/768-5-0x0000000002970000-0x0000000002971000-memory.dmp

    Filesize

    4KB

  • memory/768-7-0x0000000002990000-0x0000000002991000-memory.dmp

    Filesize

    4KB

  • memory/768-2-0x00000000012EC000-0x000000000188F000-memory.dmp

    Filesize

    5.6MB

  • memory/768-6-0x0000000002980000-0x0000000002981000-memory.dmp

    Filesize

    4KB

  • memory/768-8-0x0000000000DB0000-0x0000000002251000-memory.dmp

    Filesize

    20.6MB

  • memory/768-1-0x0000000002920000-0x0000000002921000-memory.dmp

    Filesize

    4KB

  • memory/768-4-0x0000000002960000-0x0000000002961000-memory.dmp

    Filesize

    4KB

  • memory/768-3-0x0000000002950000-0x0000000002951000-memory.dmp

    Filesize

    4KB

  • memory/768-11-0x0000000036550000-0x0000000036560000-memory.dmp

    Filesize

    64KB

  • memory/768-12-0x0000000000DB0000-0x0000000002251000-memory.dmp

    Filesize

    20.6MB

  • memory/768-13-0x0000000000DB0000-0x0000000002251000-memory.dmp

    Filesize

    20.6MB

  • memory/768-0-0x00000000027F0000-0x00000000027F1000-memory.dmp

    Filesize

    4KB

  • memory/768-35-0x00000000012EC000-0x000000000188F000-memory.dmp

    Filesize

    5.6MB

  • memory/768-36-0x0000000000DB0000-0x0000000002251000-memory.dmp

    Filesize

    20.6MB