Resubmissions

28/03/2025, 23:09

250328-247w7avpt6 7

Analysis

  • max time kernel
    3s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 23:09

General

  • Target

    VioletLoader.exe

  • Size

    5.6MB

  • MD5

    096d065c40c4947b28b1f55d4cb9f08f

  • SHA1

    9d80dd4253d2bf0f04f403000fd9494710ec41f4

  • SHA256

    9b62a2f2268fc861154836091deaa49607a79a292b6a753370e085507436329f

  • SHA512

    988530094f4174dd9a891b9b9195c47e4f976d05325a05131fcaf268bba12d5573b1121ada50b8b113759fdcc8830d74b80d0d1d08460d049b7aef8507d4a537

  • SSDEEP

    98304:rBaY/uK2fkMPIpXy8+12wONBWYcYX96eD+ESGnyXcwtdF6oCg2uz3V:tauuK2sMPIBjdDHt6epStMEqgj3

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe" MD5
        3⤵
          PID:264
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:1748
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:2100

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2168-3-0x0000000076FC0000-0x0000000076FC2000-memory.dmp

          Filesize

          8KB

        • memory/2168-11-0x0000000140000000-0x0000000140A52000-memory.dmp

          Filesize

          10.3MB

        • memory/2168-10-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

          Filesize

          8KB

        • memory/2168-8-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

          Filesize

          8KB

        • memory/2168-6-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

          Filesize

          8KB

        • memory/2168-15-0x0000000140000000-0x0000000140A52000-memory.dmp

          Filesize

          10.3MB

        • memory/2168-5-0x0000000076FC0000-0x0000000076FC2000-memory.dmp

          Filesize

          8KB

        • memory/2168-1-0x0000000076FC0000-0x0000000076FC2000-memory.dmp

          Filesize

          8KB

        • memory/2168-0-0x000000014017B000-0x00000001404B5000-memory.dmp

          Filesize

          3.2MB

        • memory/2168-17-0x000000014017B000-0x00000001404B5000-memory.dmp

          Filesize

          3.2MB

        • memory/2168-19-0x0000000140000000-0x0000000140A52000-memory.dmp

          Filesize

          10.3MB

        • memory/2168-18-0x000000014017B000-0x00000001404B5000-memory.dmp

          Filesize

          3.2MB