Analysis

  • max time kernel
    167s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    21-03-2022 09:01

General

  • Target

    9394c417afa9c6615a4aa929b062f420.exe

  • Size

    210KB

  • MD5

    9394c417afa9c6615a4aa929b062f420

  • SHA1

    b63ec408e1d573ad34b0acca7821db58b9c9135d

  • SHA256

    ebbf3b5a2fea9d1313ec35ce127db7dd86a7b6c55c241fcf3d7e2f7b167a7100

  • SHA512

    9129389dcda5b669e8e3e13424d2fe9fa851b4daa1dfb68e5da1e57591d88ff52e9c534716bc337ef9b838d73faa71af3763ff11e000788ec21effe7b883b76b

Malware Config

Signatures

  • VKeylogger

    A keylogger first seen in Nov 2020.

  • VKeylogger Payload 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe
    "C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe
      "C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
          PID:1596
      • C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe
        "C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe
          "C:\Users\Admin\AppData\Local\Temp\9394c417afa9c6615a4aa929b062f420.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3476
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            4⤵
            • Adds Run key to start application
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of FindShellTrayWindow
            PID:1364
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Drops file in Windows directory
      PID:1260

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1260-148-0x00000217A7320000-0x00000217A7324000-memory.dmp
      Filesize

      16KB

    • memory/1260-153-0x00000217A7690000-0x00000217A7694000-memory.dmp
      Filesize

      16KB

    • memory/1260-152-0x00000217A76C0000-0x00000217A76C4000-memory.dmp
      Filesize

      16KB

    • memory/1260-151-0x00000217A7670000-0x00000217A7674000-memory.dmp
      Filesize

      16KB

    • memory/1260-150-0x00000217A7670000-0x00000217A7674000-memory.dmp
      Filesize

      16KB

    • memory/1260-147-0x00000217A6CE0000-0x00000217A6CE4000-memory.dmp
      Filesize

      16KB

    • memory/1260-145-0x00000217A3D60000-0x00000217A3D70000-memory.dmp
      Filesize

      64KB

    • memory/1260-146-0x00000217A4920000-0x00000217A4930000-memory.dmp
      Filesize

      64KB

    • memory/1260-149-0x00000217A7320000-0x00000217A7324000-memory.dmp
      Filesize

      16KB

    • memory/1364-144-0x0000000000690000-0x000000000069F000-memory.dmp
      Filesize

      60KB

    • memory/1476-141-0x00000000774C0000-0x0000000077663000-memory.dmp
      Filesize

      1.6MB

    • memory/1476-140-0x00000000004A0000-0x00000000004D7000-memory.dmp
      Filesize

      220KB

    • memory/1476-139-0x00000000774C0000-0x0000000077663000-memory.dmp
      Filesize

      1.6MB

    • memory/1596-138-0x0000000000660000-0x000000000066F000-memory.dmp
      Filesize

      60KB

    • memory/2620-134-0x00000000774C0000-0x0000000077663000-memory.dmp
      Filesize

      1.6MB

    • memory/2620-135-0x00000000004A0000-0x00000000004D7000-memory.dmp
      Filesize

      220KB

    • memory/3476-143-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4352-137-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4352-136-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB