Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-05-2021 00:55

General

  • Target

    e6817b5b8eeb25f67072d405df7b5955cd69f77b9d64688a86cfcfd235c0c8ca.exe

  • Size

    445KB

  • MD5

    b90200f4c155dae5f6460839fe6917fa

  • SHA1

    c0bcdc5429dcb3a07400884f73dfe3da3e679198

  • SHA256

    e6817b5b8eeb25f67072d405df7b5955cd69f77b9d64688a86cfcfd235c0c8ca

  • SHA512

    adfdf8c6a8056109bf781a9973c370c26c3f5ba7a84326d0baa96da5a738133a549187817db859d3c9aa075bc934fd5ff59720957160d4db52dec85e26d1e79a

Score
10/10

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6817b5b8eeb25f67072d405df7b5955cd69f77b9d64688a86cfcfd235c0c8ca.exe
    "C:\Users\Admin\AppData\Local\Temp\e6817b5b8eeb25f67072d405df7b5955cd69f77b9d64688a86cfcfd235c0c8ca.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1072

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1072-60-0x0000000000400000-0x0000000000434000-memory.dmp
    Filesize

    208KB