Analysis
-
max time kernel
141s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
21-03-2022 08:07
Static task
static1
Behavioral task
behavioral1
Sample
f876084f0a4c4921043f0c5d9a300a10.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
f876084f0a4c4921043f0c5d9a300a10.exe
Resource
win10v2004-20220310-en
General
-
Target
f876084f0a4c4921043f0c5d9a300a10.exe
-
Size
295KB
-
MD5
f876084f0a4c4921043f0c5d9a300a10
-
SHA1
26750325c38616947a66fcf4132afd30bdccbbe6
-
SHA256
04b8f38bffca4122470e8af1b123630809bc7a6fb4e66a3e0a99f82133c9bdf1
-
SHA512
577f59015f58f6a7f6353b183293d834bea07aed8bf970a14888551239c3cca1eb4915ea3768efa697c82a53d33be50eb3a4d279c0ce4a77eb700f8045117587
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 4 IoCs
resource yara_rule behavioral2/memory/2644-135-0x0000000000480000-0x0000000000580000-memory.dmp family_vkeylogger behavioral2/memory/2644-136-0x00000000021B0000-0x00000000021C2000-memory.dmp family_vkeylogger behavioral2/memory/2644-137-0x0000000000400000-0x0000000000474000-memory.dmp family_vkeylogger behavioral2/memory/3296-138-0x0000000000ED0000-0x0000000000EE3000-memory.dmp family_vkeylogger -
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mfoedmf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f876084f0a4c4921043f0c5d9a300a10.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ghtrh = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 3296 2644 f876084f0a4c4921043f0c5d9a300a10.exe 87 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\BIT1447.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\LZOCjtiHKk8= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\BIT1552.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\a3f602ea4d534d006919a2613d91f9506b383314 svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\BIT2E97.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\BIT2F54.tmp svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 456 2644 WerFault.exe 82 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2644 f876084f0a4c4921043f0c5d9a300a10.exe 3296 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3296 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3296 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3296 2644 f876084f0a4c4921043f0c5d9a300a10.exe 87 PID 2644 wrote to memory of 3296 2644 f876084f0a4c4921043f0c5d9a300a10.exe 87 PID 2644 wrote to memory of 3296 2644 f876084f0a4c4921043f0c5d9a300a10.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f876084f0a4c4921043f0c5d9a300a10.exe"C:\Users\Admin\AppData\Local\Temp\f876084f0a4c4921043f0c5d9a300a10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 4722⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2644 -ip 26441⤵PID:2268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Drops file in Windows directory
PID:1872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4880