Analysis
-
max time kernel
170s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:52
Static task
static1
Behavioral task
behavioral1
Sample
d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe
Resource
win7-20220718-en
General
-
Target
d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe
-
Size
165KB
-
MD5
299fd6f018adf3df8f4c0c49f43f3841
-
SHA1
16b95f12a1f30ea9f3d4c55fa468a5f7e8f5ef1e
-
SHA256
d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1
-
SHA512
cbfb0f7f0d5532ee2ca03f391980dbbbd031bf36f1d2b78140bc02ec5dd7c1b8dc8c0bb7d948ad56918a629959d5331a73047a91067e43760cadd3f942add886
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jvbd.exepid process 3592 jvbd.exe -
Drops file in Windows directory 1 IoCs
Processes:
d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exedescription ioc process File created C:\Windows\Tasks\corolina17.job d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exepid process 1136 d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe 1136 d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe"C:\Users\Admin\AppData\Local\Temp\d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\pckr\jvbd.exeC:\ProgramData\pckr\jvbd.exe start21⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\pckr\jvbd.exeFilesize
165KB
MD5299fd6f018adf3df8f4c0c49f43f3841
SHA116b95f12a1f30ea9f3d4c55fa468a5f7e8f5ef1e
SHA256d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1
SHA512cbfb0f7f0d5532ee2ca03f391980dbbbd031bf36f1d2b78140bc02ec5dd7c1b8dc8c0bb7d948ad56918a629959d5331a73047a91067e43760cadd3f942add886
-
C:\ProgramData\pckr\jvbd.exeFilesize
165KB
MD5299fd6f018adf3df8f4c0c49f43f3841
SHA116b95f12a1f30ea9f3d4c55fa468a5f7e8f5ef1e
SHA256d42f5b2eb36690d5187c90c79a4589bcb1b80121da533deb1cf23b7a451b56c1
SHA512cbfb0f7f0d5532ee2ca03f391980dbbbd031bf36f1d2b78140bc02ec5dd7c1b8dc8c0bb7d948ad56918a629959d5331a73047a91067e43760cadd3f942add886
-
memory/1136-131-0x0000000000400000-0x0000000000449000-memory.dmpFilesize
292KB
-
memory/1136-130-0x000000000075B000-0x000000000075F000-memory.dmpFilesize
16KB
-
memory/1136-136-0x0000000000400000-0x0000000000449000-memory.dmpFilesize
292KB
-
memory/3592-134-0x000000000076A000-0x000000000076E000-memory.dmpFilesize
16KB
-
memory/3592-135-0x0000000000400000-0x0000000000449000-memory.dmpFilesize
292KB