Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-12-2021 20:41
Static task
static1
Behavioral task
behavioral1
Sample
7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe
-
Size
337KB
-
MD5
41d46166752bc1ca3251f45caaab670c
-
SHA1
bde17b99bd1502e04c644548f40fdb6212db2aa7
-
SHA256
7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5
-
SHA512
6606c144a73d59cf68080bfa58f8e26401d768be614bd94843a2eb003e457ee53487b0e9284e4dffaea9befeae1c57edd39f9e84d0c1df261b31372473077741
Score
10/10
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral1/memory/2708-116-0x0000000000600000-0x000000000060E000-memory.dmp family_vkeylogger behavioral1/memory/2708-117-0x0000000000400000-0x00000000004D5000-memory.dmp family_vkeylogger behavioral1/memory/612-119-0x0000000002FB0000-0x0000000002FBF000-memory.dmp family_vkeylogger -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefgre = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytyr = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 612 2708 7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe 69 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2708 7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe 612 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 612 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 612 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 612 2708 7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe 69 PID 2708 wrote to memory of 612 2708 7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe 69 PID 2708 wrote to memory of 612 2708 7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe"C:\Users\Admin\AppData\Local\Temp\7325d304e8560ff643a656fd3689adcaec39650840efa8273c4556f6532e98d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:612
-