Analysis
-
max time kernel
110s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
16-12-2021 02:17
Static task
static1
Behavioral task
behavioral1
Sample
8c5d3c16ae8cb907379a21bfab8cbb56.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8c5d3c16ae8cb907379a21bfab8cbb56.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
8c5d3c16ae8cb907379a21bfab8cbb56.exe
-
Size
161KB
-
MD5
8c5d3c16ae8cb907379a21bfab8cbb56
-
SHA1
c953abf45094625232a4b7a46ad91948e3f97b9e
-
SHA256
3367fd9ef4970f0f5a98b1e431c89dab120c098b8a9bed70b8729864931d274a
-
SHA512
25fc4b10d8e44b80a2bd47d3413ce99f647d1ad083fdc3c56e5c47e9d24deed0bcd1b998cbdf7ae672edc087d4d1c6b5773150471b189ee635336257ddc2b878
Score
10/10
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-116-0x00000000008F0000-0x00000000008FE000-memory.dmp family_vkeylogger behavioral2/memory/4076-117-0x0000000000400000-0x000000000081A000-memory.dmp family_vkeylogger behavioral2/memory/816-119-0x0000000000C20000-0x0000000000C2F000-memory.dmp family_vkeylogger -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox_update = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeDriver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8c5d3c16ae8cb907379a21bfab8cbb56.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8c5d3c16ae8cb907379a21bfab8cbb56.exedescription pid process target process PID 4076 set thread context of 816 4076 8c5d3c16ae8cb907379a21bfab8cbb56.exe explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
8c5d3c16ae8cb907379a21bfab8cbb56.exeexplorer.exepid process 4076 8c5d3c16ae8cb907379a21bfab8cbb56.exe 816 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
explorer.exepid process 816 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8c5d3c16ae8cb907379a21bfab8cbb56.exedescription pid process target process PID 4076 wrote to memory of 816 4076 8c5d3c16ae8cb907379a21bfab8cbb56.exe explorer.exe PID 4076 wrote to memory of 816 4076 8c5d3c16ae8cb907379a21bfab8cbb56.exe explorer.exe PID 4076 wrote to memory of 816 4076 8c5d3c16ae8cb907379a21bfab8cbb56.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c5d3c16ae8cb907379a21bfab8cbb56.exe"C:\Users\Admin\AppData\Local\Temp\8c5d3c16ae8cb907379a21bfab8cbb56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/816-118-0x0000000000C22E90-mapping.dmp
-
memory/816-119-0x0000000000C20000-0x0000000000C2F000-memory.dmpFilesize
60KB
-
memory/4076-116-0x00000000008F0000-0x00000000008FE000-memory.dmpFilesize
56KB
-
memory/4076-115-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/4076-117-0x0000000000400000-0x000000000081A000-memory.dmpFilesize
4.1MB