Analysis
-
max time kernel
166s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:59
Static task
static1
Behavioral task
behavioral1
Sample
BF0SGkmt7ZN2o4u.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
BF0SGkmt7ZN2o4u.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
BF0SGkmt7ZN2o4u.exe
-
Size
830KB
-
MD5
f986110a13038171184dbf858669a6de
-
SHA1
565d73cde90400f4366570ae6297f51361ee14f0
-
SHA256
afb7dcf65128c644b28c6b29611d9766c6d41797b6d4edb189ac1e3dc0effc77
-
SHA512
1f994738f6b7dd742486bf5752c9a2a1c7850cd94ef2227dfb5fca88d4b9704d46b986ad33be901b91c3292c76da1123146bd1d400befcdf231f521c3c1e782a
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
BF0SGkmt7ZN2o4u.exepid process 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe 3380 BF0SGkmt7ZN2o4u.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
BF0SGkmt7ZN2o4u.exedescription pid process Token: SeDebugPrivilege 3380 BF0SGkmt7ZN2o4u.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
BF0SGkmt7ZN2o4u.exedescription pid process target process PID 3380 wrote to memory of 4724 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4724 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4724 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4692 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4692 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4692 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4688 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4688 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4688 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 732 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 732 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 732 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4652 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4652 3380 BF0SGkmt7ZN2o4u.exe vbc.exe PID 3380 wrote to memory of 4652 3380 BF0SGkmt7ZN2o4u.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BF0SGkmt7ZN2o4u.exe"C:\Users\Admin\AppData\Local\Temp\BF0SGkmt7ZN2o4u.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵PID:4724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵PID:4692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵PID:4688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵PID:732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"2⤵PID:4652
-