Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    15-05-2021 12:21

General

  • Target

    aac389699b23ed3e257fc4f015bbe845fcdffc15e4ed3f556b7761a28969b4fc.exe

  • Size

    221KB

  • MD5

    b43417d1d2ecf21e153fb25c17b7782a

  • SHA1

    335c63dbedaa19d6a53aef11a8710ff25f7ad982

  • SHA256

    aac389699b23ed3e257fc4f015bbe845fcdffc15e4ed3f556b7761a28969b4fc

  • SHA512

    0c1deb022681f302aead6d06d68b092ce05db77e7807528a3047fed92d238e8dd0cecddb9e183d1b09c1da9fdc91b9958f62ec7fdb6f6076f0b8bba0464d1709

Score
10/10

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aac389699b23ed3e257fc4f015bbe845fcdffc15e4ed3f556b7761a28969b4fc.exe
    "C:\Users\Admin\AppData\Local\Temp\aac389699b23ed3e257fc4f015bbe845fcdffc15e4ed3f556b7761a28969b4fc.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:3972

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads