Analysis

  • max time kernel
    102s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 10:48

General

  • Target

    bin/Injector.exe

  • Size

    3.4MB

  • MD5

    859d36f3e841dff847048cedda17fe95

  • SHA1

    9c522dfbdfcb67835c6fa1d801952738c3759bed

  • SHA256

    65618512752c7c4f02fd7f10b54b27b1c3a26a433ccbff0f2e90bfc98b306e4c

  • SHA512

    a52fdeffc368d7932e94042710c90502a646909e4fe949602416064fc4715751be017e8b23590feca1dd390cca45f4ae6fe24967ec1697d5df234fcb2bb737ae

  • SSDEEP

    49152:Wx2dqYFpl0sk7CQuZ6MKxGA6DWd2LaDreCoMPGHCgSx4Citttf985qFzXT84B2c6:Wx2dbU7C9cMK4ydSaDiTMOHCt7itt64

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bin\Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\bin\Injector.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4232-0-0x00007FF67BE30000-0x00007FF67C3D6000-memory.dmp

    Filesize

    5.6MB