Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-03-2022 03:30
Static task
static1
General
-
Target
fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe
-
Size
232KB
-
MD5
03f49c1783459a9e989a715b0598101d
-
SHA1
6873edccffbfc63f731d90e60962b009970756a6
-
SHA256
fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
-
SHA512
a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
vfwevm.exevvik.execmqdfg.exepid process 2248 vfwevm.exe 4348 vvik.exe 1400 cmqdfg.exe -
Drops file in Windows directory 5 IoCs
Processes:
fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exevfwevm.exevvik.exedescription ioc process File created C:\Windows\Tasks\vfwevm.job fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe File opened for modification C:\Windows\Tasks\vfwevm.job fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe File created C:\Windows\Tasks\dlnxcbbksvfdadajljg.job vfwevm.exe File created C:\Windows\Tasks\cmqdfg.job vvik.exe File opened for modification C:\Windows\Tasks\cmqdfg.job vvik.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2444 2308 WerFault.exe fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exevvik.exepid process 2308 fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe 2308 fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe 4348 vvik.exe 4348 vvik.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe"C:\Users\Admin\AppData\Local\Temp\fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 9522⤵
- Program crash
PID:2444
-
-
C:\ProgramData\bdvsgrd\vfwevm.exeC:\ProgramData\bdvsgrd\vfwevm.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2308 -ip 23081⤵PID:312
-
C:\Windows\TEMP\vvik.exeC:\Windows\TEMP\vvik.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
C:\ProgramData\bdodskc\cmqdfg.exeC:\ProgramData\bdodskc\cmqdfg.exe start1⤵
- Executes dropped EXE
PID:1400
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
03f49c1783459a9e989a715b0598101d
SHA16873edccffbfc63f731d90e60962b009970756a6
SHA256fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
SHA512a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e
-
MD5
03f49c1783459a9e989a715b0598101d
SHA16873edccffbfc63f731d90e60962b009970756a6
SHA256fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
SHA512a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e
-
MD5
03f49c1783459a9e989a715b0598101d
SHA16873edccffbfc63f731d90e60962b009970756a6
SHA256fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
SHA512a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e
-
MD5
03f49c1783459a9e989a715b0598101d
SHA16873edccffbfc63f731d90e60962b009970756a6
SHA256fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
SHA512a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e
-
MD5
03f49c1783459a9e989a715b0598101d
SHA16873edccffbfc63f731d90e60962b009970756a6
SHA256fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
SHA512a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e
-
MD5
8a07c2b7cde3d4eda59832942ef5be10
SHA1626713b7343dd2ff0d0c6e45214bb58c131b5204
SHA256bdeed83d471f5243e5a0c8ebed19a98739f4becbe8f49e8d8098a986673d2f7a
SHA512c8ec07ecfb53571614ce9ca9db502b839d5dd46053c81eb54b551d978a4d07d5dc4eac1478cceba76dc6049e601e866a53e63990a166f2ff73bb717c8697e446
-
MD5
03f49c1783459a9e989a715b0598101d
SHA16873edccffbfc63f731d90e60962b009970756a6
SHA256fc490f887f4c468f5c358176cda8f0bf7b51994812e33f6b8685aa031befa1bb
SHA512a1dfe16a017d2a8a6c6bf6b347e70d457eac9030d788b3288bfb9423028026663e5ca772a171db7973537551cb41426d246acc4e4fae28c7004efdc0478c7b2e