Analysis
-
max time kernel
152s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 15:01
Static task
static1
Behavioral task
behavioral1
Sample
0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe
-
Size
282KB
-
MD5
0344bf2e7a272c184e0399ccd77b980c
-
SHA1
262e95e1fa85e7b46517c983bd552ad3df5f7c1b
-
SHA256
0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e
-
SHA512
b0d105f5bf1e89d7425c07e021e58bbc514ddfec6f2b0d854f4f660195848c5c9df151ae111d0fb5255a87eb54c94e140d553e84ef4b95e72b5275d858a8195f
Score
10/10
Malware Config
Signatures
-
VanillaRat
VanillaRat is an advanced remote administration tool coded in C#.
-
Vanilla Rat Payload 6 IoCs
resource yara_rule behavioral1/memory/1120-104-0x0000000000400000-0x0000000000422000-memory.dmp vanillarat behavioral1/memory/1120-105-0x0000000000400000-0x0000000000422000-memory.dmp vanillarat behavioral1/memory/1120-106-0x0000000000400000-0x0000000000422000-memory.dmp vanillarat behavioral1/memory/1120-107-0x000000000041DC1E-mapping.dmp vanillarat behavioral1/memory/1120-109-0x0000000000400000-0x0000000000422000-memory.dmp vanillarat behavioral1/memory/1120-111-0x0000000000400000-0x0000000000422000-memory.dmp vanillarat -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2008 set thread context of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 1208 set thread context of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 276 set thread context of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 1808 set thread context of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1776 set thread context of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 2008 wrote to memory of 1208 2008 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 27 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 1208 wrote to memory of 276 1208 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 28 PID 276 wrote to memory of 1716 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 29 PID 276 wrote to memory of 1716 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 29 PID 276 wrote to memory of 1716 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 29 PID 276 wrote to memory of 1716 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 29 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 276 wrote to memory of 1808 276 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 30 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1808 wrote to memory of 1776 1808 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 31 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32 PID 1776 wrote to memory of 1120 1776 0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"4⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"C:\Users\Admin\AppData\Local\Temp\0e9179dbbdcb9a49cefbdc6d709f54d07205bd7cdb1d1aa295654f3a54da8d8e.exe"6⤵PID:1120
-
-
-
-
-