Analysis

  • max time kernel
    106s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 19:36

General

  • Target

    25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe

  • Size

    3.7MB

  • MD5

    6660d34e11ff05ee3515fb0f58db94db

  • SHA1

    63c02a143d4f24a4ebcd1b301261967064cee893

  • SHA256

    25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a

  • SHA512

    8c8c22c770403c36dc8fd812831d796cc380083ba165f66bfdda5d14f5c910b8cd63e71ac73de5a939340d45aacf9d42840515379010a2ec90daf0f003e3f873

  • SSDEEP

    98304:2a1QPJ2T1vyGbNuh5CZpSsOGo2r6dmpimP0QYPqde62VWgO:HOcT1vlUh5CZAsO8GOim92qdePkv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 18 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with WMI 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe
    "C:\Users\Admin\AppData\Local\Temp\25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\SysWOW64\vrvctl.ocx"
      2⤵
        PID:5096
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c sc start vrvwatchserver
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Windows\SysWOW64\sc.exe
          sc start vrvwatchserver
          3⤵
          • Launches sc.exe
          PID:3080
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c wmic process where "name='watchclient.exe' " call Terminate & wmic process where "name='vrvsafec.exe' " call Terminate & wmic process where "name='vrvsafec64.exe' " call Terminate & wmic process where "name='edpvistadlg.exe' " call Terminate & wmic process where "name='vrvedp_m.exe' " call Terminate & wmic process where "name='vrvrf_c.exe' " call Terminate & wmic process where "name='vrvrf_c64.exe' " call Terminate & wmic process where "name='edptrayicon.exe' " call Terminate & wmic process where "name='DLPTray.exe' " call Terminate & wmic process where "name='EdpXcltSkin.exe' " call Terminate exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='watchclient.exe' " call Terminate
          3⤵
          • Kills process with WMI
          • Suspicious use of AdjustPrivilegeToken
          PID:5048
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvsafec.exe' " call Terminate
          3⤵
          • Kills process with WMI
          • Suspicious use of AdjustPrivilegeToken
          PID:2452
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvsafec64.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:1708
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='edpvistadlg.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:2976
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvedp_m.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:3656
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvrf_c.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:1088
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvrf_c64.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:1392
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='edptrayicon.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:4524
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='DLPTray.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:3476
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='EdpXcltSkin.exe' " call Terminate exit
          3⤵
          • Kills process with WMI
          PID:4424
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c sc start vrvwatchserver
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Windows\SysWOW64\sc.exe
          sc start vrvwatchserver
          3⤵
          • Launches sc.exe
          PID:4324

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads