Analysis

  • max time kernel
    166s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 11:59

General

  • Target

    BF0SGkmt7ZN2o4u.exe

  • Size

    830KB

  • MD5

    f986110a13038171184dbf858669a6de

  • SHA1

    565d73cde90400f4366570ae6297f51361ee14f0

  • SHA256

    afb7dcf65128c644b28c6b29611d9766c6d41797b6d4edb189ac1e3dc0effc77

  • SHA512

    1f994738f6b7dd742486bf5752c9a2a1c7850cd94ef2227dfb5fca88d4b9704d46b986ad33be901b91c3292c76da1123146bd1d400befcdf231f521c3c1e782a

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BF0SGkmt7ZN2o4u.exe
    "C:\Users\Admin\AppData\Local\Temp\BF0SGkmt7ZN2o4u.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "{path}"
      2⤵
        PID:4724
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "{path}"
        2⤵
          PID:4692
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "{path}"
          2⤵
            PID:4688
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "{path}"
            2⤵
              PID:732
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              "{path}"
              2⤵
                PID:4652

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/732-138-0x0000000000000000-mapping.dmp

            • memory/3380-130-0x0000000000640000-0x0000000000716000-memory.dmp

              Filesize

              856KB

            • memory/3380-131-0x0000000007A70000-0x0000000008014000-memory.dmp

              Filesize

              5.6MB

            • memory/3380-132-0x00000000075A0000-0x0000000007632000-memory.dmp

              Filesize

              584KB

            • memory/3380-133-0x0000000007740000-0x000000000774A000-memory.dmp

              Filesize

              40KB

            • memory/3380-134-0x000000000B510000-0x000000000B5AC000-memory.dmp

              Filesize

              624KB

            • memory/4652-139-0x0000000000000000-mapping.dmp

            • memory/4688-137-0x0000000000000000-mapping.dmp

            • memory/4692-136-0x0000000000000000-mapping.dmp

            • memory/4724-135-0x0000000000000000-mapping.dmp