Analysis
-
max time kernel
4s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-05-2021 11:35
Static task
static1
Behavioral task
behavioral1
Sample
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe
Resource
win10v20210410
General
-
Target
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe
-
Size
1.5MB
-
MD5
b4f71adf9ec04a2b87e7588d8af2ba9e
-
SHA1
316b8b6e5a80eb8d2e061a80527ff7be6731c25e
-
SHA256
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1
-
SHA512
36b1259f6769582ae28a14ebf64ac7c8133f5513f8595892a3eb3de8d71b12966967e67f82ea0a301bc91f9f912d79862905048853e22b26c070aaf9368908d2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vbc.exepid process 2032 vbc.exe -
Loads dropped DLL 1 IoCs
Processes:
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exepid process 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdtr = "C:\\Users\\Admin\\AppData\\Roaming\\WinUpdtr\\7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe" 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exevbc.exedescription pid process target process PID 1104 set thread context of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 2032 set thread context of 1176 2032 vbc.exe iexplore.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2032 vbc.exe Token: SeSecurityPrivilege 2032 vbc.exe Token: SeTakeOwnershipPrivilege 2032 vbc.exe Token: SeLoadDriverPrivilege 2032 vbc.exe Token: SeSystemProfilePrivilege 2032 vbc.exe Token: SeSystemtimePrivilege 2032 vbc.exe Token: SeProfSingleProcessPrivilege 2032 vbc.exe Token: SeIncBasePriorityPrivilege 2032 vbc.exe Token: SeCreatePagefilePrivilege 2032 vbc.exe Token: SeBackupPrivilege 2032 vbc.exe Token: SeRestorePrivilege 2032 vbc.exe Token: SeShutdownPrivilege 2032 vbc.exe Token: SeDebugPrivilege 2032 vbc.exe Token: SeSystemEnvironmentPrivilege 2032 vbc.exe Token: SeChangeNotifyPrivilege 2032 vbc.exe Token: SeRemoteShutdownPrivilege 2032 vbc.exe Token: SeUndockPrivilege 2032 vbc.exe Token: SeManageVolumePrivilege 2032 vbc.exe Token: SeImpersonatePrivilege 2032 vbc.exe Token: SeCreateGlobalPrivilege 2032 vbc.exe Token: 33 2032 vbc.exe Token: 34 2032 vbc.exe Token: 35 2032 vbc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exevbc.exedescription pid process target process PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 1104 wrote to memory of 2032 1104 7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe vbc.exe PID 2032 wrote to memory of 1176 2032 vbc.exe iexplore.exe PID 2032 wrote to memory of 1176 2032 vbc.exe iexplore.exe PID 2032 wrote to memory of 1176 2032 vbc.exe iexplore.exe PID 2032 wrote to memory of 1176 2032 vbc.exe iexplore.exe PID 2032 wrote to memory of 1176 2032 vbc.exe iexplore.exe PID 2032 wrote to memory of 1176 2032 vbc.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe"C:\Users\Admin\AppData\Local\Temp\7a8916c13c6b816bc756134acdf71c4cb9f28e9dd0f6009783a84e2b26437af1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeMD5
34aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeMD5
34aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Local\Temp\vbc.exeMD5
34aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
memory/1104-59-0x0000000075561000-0x0000000075563000-memory.dmpFilesize
8KB
-
memory/1104-64-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/1176-67-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1176-68-0x00000000004748DA-mapping.dmp
-
memory/2032-61-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/2032-62-0x000000000049F92C-mapping.dmp
-
memory/2032-69-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/2032-70-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB