Analysis

  • max time kernel
    15s
  • max time network
    22s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 19:21

General

  • Target

    TZXFile.exe

  • Size

    6.5MB

  • MD5

    c067876f2762e248c9ddc840c5c89f52

  • SHA1

    0b2cbf2228e7e76bf3a6e25e47922ab4669b123d

  • SHA256

    42466626428faee5b041adbd2d6e99f07096f7ee5d825485d0531893a9f9f546

  • SHA512

    055d0a8253c0bc96cab5fc6bb6d261f97c44344bdbf72c13ad392d6ae1a2f19f322e32f288e5004e3dcfb6d2e3b5d8def58ec7ad6790b544ffd9271e05d394f9

  • SSDEEP

    196608:Cef3Ai8DkvbFZVBkyncapqbIl2NQIDqQVRYf33M:5QvwJDBkSHpH2N1XrQnM

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • This rule detects TZX loader 2 IoCs

    Matching TZX.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TZXFile.exe
    "C:\Users\Admin\AppData\Local\Temp\TZXFile.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-0-0x0000000140489000-0x000000014078F000-memory.dmp
    Filesize

    3.0MB

  • memory/2004-1-0x00007FFCC5820000-0x00007FFCC5822000-memory.dmp
    Filesize

    8KB

  • memory/2004-2-0x0000000140000000-0x0000000140E1A000-memory.dmp
    Filesize

    14.1MB

  • memory/2004-6-0x0000000140489000-0x000000014078F000-memory.dmp
    Filesize

    3.0MB

  • memory/2004-7-0x0000000140000000-0x0000000140E1A000-memory.dmp
    Filesize

    14.1MB