Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
submitted
18-07-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe
Resource
win7-20220715-en
windows7-x64
5 signatures
150 seconds
General
-
Target
d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe
-
Size
291KB
-
MD5
ccff73a120d6a999553a1e835db041f5
-
SHA1
570efb3ef55a5ef00e79a78b3e9d26c5d32d4508
-
SHA256
d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae
-
SHA512
80905bf30b07d43b88ac790e22a57d38111010de913362e265e806395d49b59f2f07123aaef1c364bb89d70a59d8170da9d4fbe578c7d14c388d3403daad4953
Malware Config
Extracted
Family
vulturi
C2
http://192.168.1.2:5050/gate
Attributes
-
c2_encryption_key
testkey
-
c2_user
root
Signatures
-
Vulturi payload 1 IoCs
resource yara_rule behavioral1/memory/1848-54-0x00000000008A0000-0x00000000008F0000-memory.dmp family_vulturi -
Deletes itself 1 IoCs
pid Process 976 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1616 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1848 d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1848 wrote to memory of 976 1848 d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe 27 PID 1848 wrote to memory of 976 1848 d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe 27 PID 1848 wrote to memory of 976 1848 d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe 27 PID 976 wrote to memory of 1916 976 cmd.exe 29 PID 976 wrote to memory of 1916 976 cmd.exe 29 PID 976 wrote to memory of 1916 976 cmd.exe 29 PID 976 wrote to memory of 1616 976 cmd.exe 30 PID 976 wrote to memory of 1616 976 cmd.exe 30 PID 976 wrote to memory of 1616 976 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe"C:\Users\Admin\AppData\Local\Temp\d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\d67a671a38113fd35c9641e21986e3145b55cfed8145b1152f0ceb091f05d4ae.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1916
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1616
-
-