Resubmissions
28/03/2025, 23:09
250328-247w7avpt6 7Analysis
-
max time kernel
3s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 23:09
Behavioral task
behavioral1
Sample
VioletLoader.exe
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
VioletLoader.exe
Resource
win10v2004-20250314-en
4 signatures
150 seconds
General
-
Target
VioletLoader.exe
-
Size
5.6MB
-
MD5
096d065c40c4947b28b1f55d4cb9f08f
-
SHA1
9d80dd4253d2bf0f04f403000fd9494710ec41f4
-
SHA256
9b62a2f2268fc861154836091deaa49607a79a292b6a753370e085507436329f
-
SHA512
988530094f4174dd9a891b9b9195c47e4f976d05325a05131fcaf268bba12d5573b1121ada50b8b113759fdcc8830d74b80d0d1d08460d049b7aef8507d4a537
-
SSDEEP
98304:rBaY/uK2fkMPIpXy8+12wONBWYcYX96eD+ESGnyXcwtdF6oCg2uz3V:tauuK2sMPIBjdDHt6epStMEqgj3
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2168-11-0x0000000140000000-0x0000000140A52000-memory.dmp vmprotect behavioral1/memory/2168-15-0x0000000140000000-0x0000000140A52000-memory.dmp vmprotect behavioral1/memory/2168-19-0x0000000140000000-0x0000000140A52000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe 2168 VioletLoader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2340 2168 VioletLoader.exe 30 PID 2168 wrote to memory of 2340 2168 VioletLoader.exe 30 PID 2168 wrote to memory of 2340 2168 VioletLoader.exe 30 PID 2340 wrote to memory of 264 2340 cmd.exe 32 PID 2340 wrote to memory of 264 2340 cmd.exe 32 PID 2340 wrote to memory of 264 2340 cmd.exe 32 PID 2340 wrote to memory of 1748 2340 cmd.exe 33 PID 2340 wrote to memory of 1748 2340 cmd.exe 33 PID 2340 wrote to memory of 1748 2340 cmd.exe 33 PID 2340 wrote to memory of 2100 2340 cmd.exe 34 PID 2340 wrote to memory of 2100 2340 cmd.exe 34 PID 2340 wrote to memory of 2100 2340 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe"C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VioletLoader.exe" MD53⤵PID:264
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1748
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2100
-
-