Analysis

  • max time kernel
    150s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 01:39

General

  • Target

    98435713b059316d1f7c7df4af8f0544b3ea20027bd052537a8e01c244d152c7.exe

  • Size

    47KB

  • MD5

    5223585e8f2e6e608d06d17f75e5d4f0

  • SHA1

    867138167089d28d6bc5a670d4b02e9558057de0

  • SHA256

    98435713b059316d1f7c7df4af8f0544b3ea20027bd052537a8e01c244d152c7

  • SHA512

    7b277e6f28317a17593d9aa6e6f5f3c3f13f3e4c8942f62920318c18c177e3d4f9333d20c78c6ca48befcc2bbb112c58cf5db7d4ce21a4ddc7deb5cb49239a2d

  • SSDEEP

    768:4nO6XM7X+MXvup7k4T1uvsrzvycw/w/zDPeU8WfKo4O9zt6ktI/YL5QobePCcJ4o:4rXMr/XvuNke19rdwILjp80zVGYldBcH

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\98435713b059316d1f7c7df4af8f0544b3ea20027bd052537a8e01c244d152c7.exe
    "C:\Users\Admin\AppData\Local\Temp\98435713b059316d1f7c7df4af8f0544b3ea20027bd052537a8e01c244d152c7.exe"
    1⤵
    • Drops file in System32 directory
    PID:1324
  • C:\Windows\SysWOW64\vgtdcg.exe
    C:\Windows\SysWOW64\vgtdcg.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\vgtdcg.exe

    Filesize

    47KB

    MD5

    5223585e8f2e6e608d06d17f75e5d4f0

    SHA1

    867138167089d28d6bc5a670d4b02e9558057de0

    SHA256

    98435713b059316d1f7c7df4af8f0544b3ea20027bd052537a8e01c244d152c7

    SHA512

    7b277e6f28317a17593d9aa6e6f5f3c3f13f3e4c8942f62920318c18c177e3d4f9333d20c78c6ca48befcc2bbb112c58cf5db7d4ce21a4ddc7deb5cb49239a2d

  • memory/828-58-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/828-59-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/1324-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

    Filesize

    8KB

  • memory/1324-57-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB