Analysis
-
max time kernel
156s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 17:48
Static task
static1
Behavioral task
behavioral1
Sample
vnhgf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
vnhgf.exe
Resource
win10v2004-20220414-en
General
-
Target
vnhgf.exe
-
Size
300.0MB
-
MD5
a5335343971e56e6ff268dcfe8774ae9
-
SHA1
25c8a25b5c1dd7913e4447dd15056afd52d95c4a
-
SHA256
1a66d08dd756f9fe6f3e936fb3b7c245d46b267c2512c997df86030e9d634734
-
SHA512
8ef2c8eff3ea1c26fd5c202aaad0fb6e6c2f895b791e47422aa7a34b879633d531d43328767b82df977ad53528d21359897f701c0e8d1018ca935c353aa91ca4
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
hggfyu.exehggfyu.exehggfyu.exehggfyu.exepid process 1752 hggfyu.exe 1388 hggfyu.exe 2320 hggfyu.exe 4592 hggfyu.exe -
Processes:
resource yara_rule behavioral2/memory/1496-135-0x0000000000F10000-0x00000000012F4000-memory.dmp upx behavioral2/memory/1496-136-0x0000000000F10000-0x00000000012F4000-memory.dmp upx behavioral2/memory/1388-149-0x00000000009B0000-0x0000000000D94000-memory.dmp upx behavioral2/memory/1388-150-0x00000000009B0000-0x0000000000D94000-memory.dmp upx behavioral2/memory/4592-158-0x0000000000790000-0x0000000000B74000-memory.dmp upx behavioral2/memory/4592-159-0x0000000000790000-0x0000000000B74000-memory.dmp upx -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vnhgf.exehggfyu.exehggfyu.exedescription pid process target process PID 3360 set thread context of 1496 3360 vnhgf.exe vnhgf.exe PID 1752 set thread context of 1388 1752 hggfyu.exe hggfyu.exe PID 2320 set thread context of 4592 2320 hggfyu.exe hggfyu.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 220 1496 WerFault.exe vnhgf.exe 3888 1388 WerFault.exe hggfyu.exe 4004 1388 WerFault.exe hggfyu.exe 2092 4592 WerFault.exe hggfyu.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 3280 schtasks.exe 4780 schtasks.exe 3172 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vnhgf.exehggfyu.exehggfyu.exedescription pid process Token: SeDebugPrivilege 3360 vnhgf.exe Token: SeDebugPrivilege 1752 hggfyu.exe Token: SeDebugPrivilege 2320 hggfyu.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
vnhgf.execmd.exehggfyu.execmd.exehggfyu.exehggfyu.execmd.exedescription pid process target process PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1496 3360 vnhgf.exe vnhgf.exe PID 3360 wrote to memory of 1324 3360 vnhgf.exe cmd.exe PID 3360 wrote to memory of 1324 3360 vnhgf.exe cmd.exe PID 3360 wrote to memory of 1324 3360 vnhgf.exe cmd.exe PID 1324 wrote to memory of 3280 1324 cmd.exe schtasks.exe PID 1324 wrote to memory of 3280 1324 cmd.exe schtasks.exe PID 1324 wrote to memory of 3280 1324 cmd.exe schtasks.exe PID 3360 wrote to memory of 4000 3360 vnhgf.exe cmd.exe PID 3360 wrote to memory of 4000 3360 vnhgf.exe cmd.exe PID 3360 wrote to memory of 4000 3360 vnhgf.exe cmd.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 1388 1752 hggfyu.exe hggfyu.exe PID 1752 wrote to memory of 3536 1752 hggfyu.exe cmd.exe PID 1752 wrote to memory of 3536 1752 hggfyu.exe cmd.exe PID 1752 wrote to memory of 3536 1752 hggfyu.exe cmd.exe PID 3536 wrote to memory of 4780 3536 cmd.exe schtasks.exe PID 3536 wrote to memory of 4780 3536 cmd.exe schtasks.exe PID 3536 wrote to memory of 4780 3536 cmd.exe schtasks.exe PID 1752 wrote to memory of 4952 1752 hggfyu.exe cmd.exe PID 1752 wrote to memory of 4952 1752 hggfyu.exe cmd.exe PID 1752 wrote to memory of 4952 1752 hggfyu.exe cmd.exe PID 1388 wrote to memory of 4004 1388 hggfyu.exe WerFault.exe PID 1388 wrote to memory of 4004 1388 hggfyu.exe WerFault.exe PID 1388 wrote to memory of 4004 1388 hggfyu.exe WerFault.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 4592 2320 hggfyu.exe hggfyu.exe PID 2320 wrote to memory of 1112 2320 hggfyu.exe cmd.exe PID 2320 wrote to memory of 1112 2320 hggfyu.exe cmd.exe PID 2320 wrote to memory of 1112 2320 hggfyu.exe cmd.exe PID 1112 wrote to memory of 3172 1112 cmd.exe schtasks.exe PID 1112 wrote to memory of 3172 1112 cmd.exe schtasks.exe PID 1112 wrote to memory of 3172 1112 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vnhgf.exe"C:\Users\Admin\AppData\Local\Temp\vnhgf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vnhgf.exe"C:\Users\Admin\AppData\Local\Temp\vnhgf.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 1883⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\vnhgf.exe" "C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1496 -ip 14961⤵
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeC:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe"C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 1883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 1883⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe" "C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1388 -ip 13881⤵
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeC:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe"C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1883⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4592 -ip 45921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hggfyu.exe.logFilesize
612B
MD52a9d08fe8550d5c1bd2234a9bba5f499
SHA1002f0e108e5b1141f507b7e6851b6778a749e223
SHA256af40b88a9082d1a47f6339d384de9a1936fca4bf8013826bbae4606c988713dd
SHA5127a0e924ac0209566d7bd63529a9732bd87b4981209bcd7038df61fa9990768d6a7882a18067cd6f1dd5c034f835ca6f0c3da2c6d78ff822165e2027f5d86aedf
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeFilesize
300.0MB
MD5a5335343971e56e6ff268dcfe8774ae9
SHA125c8a25b5c1dd7913e4447dd15056afd52d95c4a
SHA2561a66d08dd756f9fe6f3e936fb3b7c245d46b267c2512c997df86030e9d634734
SHA5128ef2c8eff3ea1c26fd5c202aaad0fb6e6c2f895b791e47422aa7a34b879633d531d43328767b82df977ad53528d21359897f701c0e8d1018ca935c353aa91ca4
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeFilesize
300.0MB
MD5a5335343971e56e6ff268dcfe8774ae9
SHA125c8a25b5c1dd7913e4447dd15056afd52d95c4a
SHA2561a66d08dd756f9fe6f3e936fb3b7c245d46b267c2512c997df86030e9d634734
SHA5128ef2c8eff3ea1c26fd5c202aaad0fb6e6c2f895b791e47422aa7a34b879633d531d43328767b82df977ad53528d21359897f701c0e8d1018ca935c353aa91ca4
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeFilesize
300.0MB
MD5a5335343971e56e6ff268dcfe8774ae9
SHA125c8a25b5c1dd7913e4447dd15056afd52d95c4a
SHA2561a66d08dd756f9fe6f3e936fb3b7c245d46b267c2512c997df86030e9d634734
SHA5128ef2c8eff3ea1c26fd5c202aaad0fb6e6c2f895b791e47422aa7a34b879633d531d43328767b82df977ad53528d21359897f701c0e8d1018ca935c353aa91ca4
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeFilesize
296.0MB
MD57b7309b8fa7690c6e809ee8fcad144d4
SHA13805acf0624ef37299503165d4ad7847286d99c4
SHA256d62438f28afbb73d023938649db3d9ac9caac670b466f6e047dfa41e9eb53da1
SHA512a7589d06636ea2b2b5078644486dfec8ef04f1ac05c1611a3820a05f977efabfab4dd3b8886847ec80f39f8c25402d243e9ea3ce063ed8bc710da90c7a19ea23
-
C:\Users\Admin\AppData\Roaming\hggfyu\hggfyu.exeFilesize
56.7MB
MD51f99bb80013bae0653190b9f50985246
SHA1c3c86eb23b07fbfef1ff170c6eeff4252bba0e46
SHA256fbb3736fe3b3ba7a4b3516f6bb2c89e8df5520738d5bf0b8063512d820de9f29
SHA5128c8e3c59d1c332bd0ba8bdaf7b87dbdd75914d7472aa31b521d1dfcf55ed29fa4468c87634c859af9f6e87fd7269b89d5b491388f57cf2b20b772e548ba9911b
-
memory/1112-160-0x0000000000000000-mapping.dmp
-
memory/1324-137-0x0000000000000000-mapping.dmp
-
memory/1388-143-0x0000000000000000-mapping.dmp
-
memory/1388-150-0x00000000009B0000-0x0000000000D94000-memory.dmpFilesize
3.9MB
-
memory/1388-149-0x00000000009B0000-0x0000000000D94000-memory.dmpFilesize
3.9MB
-
memory/1496-135-0x0000000000F10000-0x00000000012F4000-memory.dmpFilesize
3.9MB
-
memory/1496-136-0x0000000000F10000-0x00000000012F4000-memory.dmpFilesize
3.9MB
-
memory/1496-133-0x0000000000000000-mapping.dmp
-
memory/1752-142-0x0000000000200000-0x00000000003C2000-memory.dmpFilesize
1.8MB
-
memory/2320-154-0x0000000000200000-0x00000000003C2000-memory.dmpFilesize
1.8MB
-
memory/3172-161-0x0000000000000000-mapping.dmp
-
memory/3280-138-0x0000000000000000-mapping.dmp
-
memory/3360-130-0x0000000000D40000-0x0000000000F02000-memory.dmpFilesize
1.8MB
-
memory/3360-132-0x00000000059D0000-0x0000000005F74000-memory.dmpFilesize
5.6MB
-
memory/3360-131-0x00000000053B0000-0x0000000005416000-memory.dmpFilesize
408KB
-
memory/3536-146-0x0000000000000000-mapping.dmp
-
memory/4000-139-0x0000000000000000-mapping.dmp
-
memory/4004-151-0x0000000000000000-mapping.dmp
-
memory/4592-155-0x0000000000000000-mapping.dmp
-
memory/4592-158-0x0000000000790000-0x0000000000B74000-memory.dmpFilesize
3.9MB
-
memory/4592-159-0x0000000000790000-0x0000000000B74000-memory.dmpFilesize
3.9MB
-
memory/4780-147-0x0000000000000000-mapping.dmp
-
memory/4952-148-0x0000000000000000-mapping.dmp