Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-05-2021 02:49

General

  • Target

    033e4eb19a4422b9ea718d8c3c7a930f5915fe53d69710e3f5f6b50bfdf43f43.exe

  • Size

    1.4MB

  • MD5

    bf3ab2523812e2e79116c15436db812f

  • SHA1

    f2515d6f3262fc0481f6b8bc414d23b4e1cb4a4f

  • SHA256

    033e4eb19a4422b9ea718d8c3c7a930f5915fe53d69710e3f5f6b50bfdf43f43

  • SHA512

    9c94cf119d6cf72bb485820e4102786fa27bd65ccc49c8aa2efa20a0a37475299f3a431942e3d87e6cc907ff58131bcefb528cbbe95204c571510120eab3615f

Score
10/10

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033e4eb19a4422b9ea718d8c3c7a930f5915fe53d69710e3f5f6b50bfdf43f43.exe
    "C:\Users\Admin\AppData\Local\Temp\033e4eb19a4422b9ea718d8c3c7a930f5915fe53d69710e3f5f6b50bfdf43f43.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1824-114-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB