Analysis
-
max time kernel
368s -
max time network
1554s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-09-2021 11:20
Static task
static1
Behavioral task
behavioral1
Sample
vessel-64.dat.dll
Resource
win10-en
windows10_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
core.bat
-
Size
186B
-
MD5
c69400616b3e6ff4875c8322f7ef0ed1
-
SHA1
da112c52c72f50a64ff4aabcec17f5f3c16c5148
-
SHA256
d6e0649ba38b6acbd75fd06d34cbe332220c4b6d7d774afceaa2816a6bd8ba68
-
SHA512
2c61b0c6578eb8306da959ad329723902469a07418b2ea80a93f330f59ce757c0d660b7ae915d6d14735e6557b324668c6fd1af9cc0da866cc139fc35e5df0f9
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1640 rundll32.exe 2156 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exerundll32.exepid process 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 2156 rundll32.exe 2156 rundll32.exe 2156 rundll32.exe 2156 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exedescription pid process target process PID 3008 wrote to memory of 1640 3008 cmd.exe rundll32.exe PID 3008 wrote to memory of 1640 3008 cmd.exe rundll32.exe PID 3008 wrote to memory of 2156 3008 cmd.exe rundll32.exe PID 3008 wrote to memory of 2156 3008 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vessel-64.dat,DllMain /i="license.dat"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vessel-64.dat,update /i="license.dat"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses