Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe
Resource
win10v2004-20220414-en
General
-
Target
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe
-
Size
498KB
-
MD5
7ab1da3d85f6eb7583bc9d7d44da989a
-
SHA1
c18a98fd2813f75c7142bb0be9c61085b1bd9de2
-
SHA256
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80
-
SHA512
5abd4f512e579b9df942a6faa14fada1bb484d8e9ccacdf56512e618b9643af2470607c9379b103e076c50164d79c6d4c2242dab717b67ff323e415a497c05d2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vbcoon.exepid process 1632 vbcoon.exe -
Loads dropped DLL 1 IoCs
Processes:
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exepid process 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe -
NTFS ADS 1 IoCs
Processes:
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exedescription ioc process File created \??\c:\programdata\17c92f7746\vbcoon.exe:Zone.Identifier 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exevbcoon.exepid process 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe 1632 vbcoon.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exevbcoon.exepid process 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe 1632 vbcoon.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exevbcoon.exedescription pid process target process PID 2040 wrote to memory of 1632 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe vbcoon.exe PID 2040 wrote to memory of 1632 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe vbcoon.exe PID 2040 wrote to memory of 1632 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe vbcoon.exe PID 2040 wrote to memory of 1632 2040 876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe vbcoon.exe PID 1632 wrote to memory of 1484 1632 vbcoon.exe REG.exe PID 1632 wrote to memory of 1484 1632 vbcoon.exe REG.exe PID 1632 wrote to memory of 1484 1632 vbcoon.exe REG.exe PID 1632 wrote to memory of 1484 1632 vbcoon.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe"C:\Users\Admin\AppData\Local\Temp\876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
\??\c:\programdata\17c92f7746\vbcoon.exec:\programdata\17c92f7746\vbcoon.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\17c92f77463⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\0MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\17c92f7746\vbcoon.exeFilesize
498KB
MD57ab1da3d85f6eb7583bc9d7d44da989a
SHA1c18a98fd2813f75c7142bb0be9c61085b1bd9de2
SHA256876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80
SHA5125abd4f512e579b9df942a6faa14fada1bb484d8e9ccacdf56512e618b9643af2470607c9379b103e076c50164d79c6d4c2242dab717b67ff323e415a497c05d2
-
\ProgramData\17c92f7746\vbcoon.exeFilesize
498KB
MD57ab1da3d85f6eb7583bc9d7d44da989a
SHA1c18a98fd2813f75c7142bb0be9c61085b1bd9de2
SHA256876602eb517acecfd824b695225966c78a074f6e002641062d242999f9e5eb80
SHA5125abd4f512e579b9df942a6faa14fada1bb484d8e9ccacdf56512e618b9643af2470607c9379b103e076c50164d79c6d4c2242dab717b67ff323e415a497c05d2
-
memory/1484-63-0x0000000000000000-mapping.dmp
-
memory/1632-57-0x0000000000000000-mapping.dmp
-
memory/1632-61-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2040-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/2040-55-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2040-60-0x0000000000390000-0x0000000000398000-memory.dmpFilesize
32KB