Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-07-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe
Resource
win7-20220414-en
General
-
Target
41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe
-
Size
291KB
-
MD5
f5c4755560853724cd144906222ea0e0
-
SHA1
08599b26cdd0f6e5e37a42b194ecee3390d199ef
-
SHA256
41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f
-
SHA512
ebfe4fcc477599dbe246759c13e9bf16fbdb72af579aaa0595c82fd335d2a6a3e73557d10c2b3a285eeed8d5a2d8e9b1f93caf64daf0c3a565314130cd22f076
Malware Config
Extracted
vulturi
http://xmarv.ddns.net:5050/gate
-
c2_encryption_key
testxmarvel1
-
c2_user
root
Signatures
-
Vulturi payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/872-130-0x00000000004D0000-0x0000000000520000-memory.dmp family_vulturi -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exedescription pid Process Token: SeDebugPrivilege 872 41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.execmd.exedescription pid Process procid_target PID 872 wrote to memory of 2428 872 41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe 82 PID 872 wrote to memory of 2428 872 41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe 82 PID 2428 wrote to memory of 2512 2428 cmd.exe 84 PID 2428 wrote to memory of 2512 2428 cmd.exe 84 PID 2428 wrote to memory of 2368 2428 cmd.exe 85 PID 2428 wrote to memory of 2368 2428 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe"C:\Users\Admin\AppData\Local\Temp\41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\41974493fb3bc56d1f4f9224adcf02a7adb179adf827425b6f2f29c4ab6dec3f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2368
-
-