Analysis
-
max time kernel
119s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-12-2021 14:29
Static task
static1
Behavioral task
behavioral1
Sample
tmp/dgt.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tmp/dgt.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
tmp/dgt.exe
-
Size
245KB
-
MD5
b0e4ad8a749f5a154420e5f6d3eadbe0
-
SHA1
d9597f8e4d1b35acf9fed9622548946b83947bda
-
SHA256
734045009f0b155db1692141832332bb4fdc4511399a67a5e22835a2b72fc7bd
-
SHA512
dde672033bf3d426a6cedcb774bdca7815f3afab8fcdf8dc93016d3362c85a2e0134505747b96bab2e729533e91add660165aa3de106a5e701f2dbda2b0c8071
Score
10/10
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral2/memory/3188-115-0x0000000000620000-0x000000000062F000-memory.dmp family_vkeylogger behavioral2/memory/3188-121-0x0000000000623500-mapping.dmp family_vkeylogger behavioral2/memory/2324-123-0x00000000036D0000-0x00000000036DF000-memory.dmp family_vkeylogger -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeDriver = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox_update = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2480 set thread context of 3188 2480 dgt.exe 69 PID 3188 set thread context of 2324 3188 RegSvcs.exe 70 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3188 RegSvcs.exe 2324 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3188 2480 dgt.exe 69 PID 2480 wrote to memory of 3188 2480 dgt.exe 69 PID 2480 wrote to memory of 3188 2480 dgt.exe 69 PID 2480 wrote to memory of 3188 2480 dgt.exe 69 PID 2480 wrote to memory of 3188 2480 dgt.exe 69 PID 3188 wrote to memory of 2324 3188 RegSvcs.exe 70 PID 3188 wrote to memory of 2324 3188 RegSvcs.exe 70 PID 3188 wrote to memory of 2324 3188 RegSvcs.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp\dgt.exe"C:\Users\Admin\AppData\Local\Temp\tmp\dgt.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
PID:2324
-
-