Analysis

  • max time kernel
    117s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    21-03-2022 15:30

General

  • Target

    af60cee205fbfa4a08bfa445212aafba454f2f7234edb093a54d067ec967ef8c.exe

  • Size

    245KB

  • MD5

    5e66bfb2c836a66c9ec791a481051d96

  • SHA1

    4458102441dcf3957e3fffec22cec425c432c2d3

  • SHA256

    af60cee205fbfa4a08bfa445212aafba454f2f7234edb093a54d067ec967ef8c

  • SHA512

    d0b47553e93076393a1cade86eaca055bff7ef1384df81b877ae9d3aa3897ae46ee7d57f6aefa32948a8881dca6c6e4bf0663007295d22017c0cf3ceda9e7594

Malware Config

Signatures

  • VKeylogger

    A keylogger first seen in Nov 2020.

  • VKeylogger Payload 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af60cee205fbfa4a08bfa445212aafba454f2f7234edb093a54d067ec967ef8c.exe
    "C:\Users\Admin\AppData\Local\Temp\af60cee205fbfa4a08bfa445212aafba454f2f7234edb093a54d067ec967ef8c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      PID:1256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 452
      2⤵
      • Program crash
      PID:260
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4632 -ip 4632
    1⤵
      PID:3612

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1256-138-0x0000000000D00000-0x0000000000D0F000-memory.dmp

      Filesize

      60KB

    • memory/4632-134-0x000000000068E000-0x0000000000699000-memory.dmp

      Filesize

      44KB

    • memory/4632-135-0x000000000068E000-0x0000000000699000-memory.dmp

      Filesize

      44KB

    • memory/4632-136-0x0000000000600000-0x000000000060E000-memory.dmp

      Filesize

      56KB

    • memory/4632-137-0x0000000000400000-0x000000000046E000-memory.dmp

      Filesize

      440KB