Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07/07/2020, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
76BVN200706awbinformation_PDF.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
76BVN200706awbinformation_PDF.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
76BVN200706awbinformation_PDF.exe
-
Size
5.1MB
-
MD5
1082b9039a4b9fafd5d6c40663bed8a2
-
SHA1
7f9a433442b492d6860dcab52b4aa83bfb495222
-
SHA256
ec4f62108a0efc101539e57198ffffaac7be084e792b43daeb4561881c0fc2f2
-
SHA512
dfdade40ac974165dbff9e0d40be375416a7116f13e6769d366452d352562dcee65a1c7c0bf894e405d9e83a355fdcb7171b0525aaac6c4733d3eb4695efbc41
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 1300 1756 vgbuild.exe 30 -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\gvbuild = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\vgbuild.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1400 76BVN200706awbinformation_PDF.exe Token: SeDebugPrivilege 1756 vgbuild.exe Token: SeDebugPrivilege 1300 AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1400 76BVN200706awbinformation_PDF.exe 1400 76BVN200706awbinformation_PDF.exe 1400 76BVN200706awbinformation_PDF.exe 1756 vgbuild.exe 1756 vgbuild.exe 1756 vgbuild.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1032 1400 76BVN200706awbinformation_PDF.exe 24 PID 1400 wrote to memory of 1032 1400 76BVN200706awbinformation_PDF.exe 24 PID 1400 wrote to memory of 1032 1400 76BVN200706awbinformation_PDF.exe 24 PID 1400 wrote to memory of 1032 1400 76BVN200706awbinformation_PDF.exe 24 PID 1032 wrote to memory of 784 1032 cmd.exe 26 PID 1032 wrote to memory of 784 1032 cmd.exe 26 PID 1032 wrote to memory of 784 1032 cmd.exe 26 PID 1032 wrote to memory of 784 1032 cmd.exe 26 PID 1400 wrote to memory of 1756 1400 76BVN200706awbinformation_PDF.exe 29 PID 1400 wrote to memory of 1756 1400 76BVN200706awbinformation_PDF.exe 29 PID 1400 wrote to memory of 1756 1400 76BVN200706awbinformation_PDF.exe 29 PID 1400 wrote to memory of 1756 1400 76BVN200706awbinformation_PDF.exe 29 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 PID 1756 wrote to memory of 1300 1756 vgbuild.exe 30 -
Loads dropped DLL 2 IoCs
pid Process 1400 76BVN200706awbinformation_PDF.exe 1756 vgbuild.exe -
Executes dropped EXE 2 IoCs
pid Process 1756 vgbuild.exe 1300 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76BVN200706awbinformation_PDF.exe"C:\Users\Admin\AppData\Local\Temp\76BVN200706awbinformation_PDF.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v gvbuild /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\vgbuild.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v gvbuild /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\vgbuild.exe"3⤵
- Adds Run entry to start application
PID:784
-
-
-
C:\Users\Admin\AppData\Roaming\vgbuild.exe"C:\Users\Admin\AppData\Roaming\vgbuild.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
PID:1300
-
-