Analysis
-
max time kernel
106s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe
Resource
win10v2004-20220901-en
General
-
Target
25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe
-
Size
3.7MB
-
MD5
6660d34e11ff05ee3515fb0f58db94db
-
SHA1
63c02a143d4f24a4ebcd1b301261967064cee893
-
SHA256
25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a
-
SHA512
8c8c22c770403c36dc8fd812831d796cc380083ba165f66bfdda5d14f5c910b8cd63e71ac73de5a939340d45aacf9d42840515379010a2ec90daf0f003e3f873
-
SSDEEP
98304:2a1QPJ2T1vyGbNuh5CZpSsOGo2r6dmpimP0QYPqde62VWgO:HOcT1vlUh5CZAsO8GOim92qdePkv
Malware Config
Signatures
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EdpEDisk.exe 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\vrvaudsf64.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\vrvaud_c.dll 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\Vrvaud_c64.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\Vrvaud_c64.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\UpAgent.log 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\EdpRecUpAgent.log 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\vrvaudsf.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\vrvaudsf2k.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\vrvaudsf64.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\vrvaud_c.dll 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\VRVEDP_M.exe 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\EdpEDisk.exe 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\vrvaudsf.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\vrvaudsf2k.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\Vrvaud_c.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File created C:\Windows\SysWOW64\Vrvaud_c.sys 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe File opened for modification C:\Windows\SysWOW64\Watchclient.ini 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4324 sc.exe 3080 sc.exe -
Kills process with WMI 10 IoCs
pid Process 2452 WMIC.exe 1708 WMIC.exe 3656 WMIC.exe 1088 WMIC.exe 1392 WMIC.exe 4524 WMIC.exe 4424 WMIC.exe 5048 WMIC.exe 3476 WMIC.exe 2976 WMIC.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe Token: SeIncreaseQuotaPrivilege 5048 WMIC.exe Token: SeSecurityPrivilege 5048 WMIC.exe Token: SeTakeOwnershipPrivilege 5048 WMIC.exe Token: SeLoadDriverPrivilege 5048 WMIC.exe Token: SeSystemProfilePrivilege 5048 WMIC.exe Token: SeSystemtimePrivilege 5048 WMIC.exe Token: SeProfSingleProcessPrivilege 5048 WMIC.exe Token: SeIncBasePriorityPrivilege 5048 WMIC.exe Token: SeCreatePagefilePrivilege 5048 WMIC.exe Token: SeBackupPrivilege 5048 WMIC.exe Token: SeRestorePrivilege 5048 WMIC.exe Token: SeShutdownPrivilege 5048 WMIC.exe Token: SeDebugPrivilege 5048 WMIC.exe Token: SeSystemEnvironmentPrivilege 5048 WMIC.exe Token: SeRemoteShutdownPrivilege 5048 WMIC.exe Token: SeUndockPrivilege 5048 WMIC.exe Token: SeManageVolumePrivilege 5048 WMIC.exe Token: 33 5048 WMIC.exe Token: 34 5048 WMIC.exe Token: 35 5048 WMIC.exe Token: 36 5048 WMIC.exe Token: SeIncreaseQuotaPrivilege 5048 WMIC.exe Token: SeSecurityPrivilege 5048 WMIC.exe Token: SeTakeOwnershipPrivilege 5048 WMIC.exe Token: SeLoadDriverPrivilege 5048 WMIC.exe Token: SeSystemProfilePrivilege 5048 WMIC.exe Token: SeSystemtimePrivilege 5048 WMIC.exe Token: SeProfSingleProcessPrivilege 5048 WMIC.exe Token: SeIncBasePriorityPrivilege 5048 WMIC.exe Token: SeCreatePagefilePrivilege 5048 WMIC.exe Token: SeBackupPrivilege 5048 WMIC.exe Token: SeRestorePrivilege 5048 WMIC.exe Token: SeShutdownPrivilege 5048 WMIC.exe Token: SeDebugPrivilege 5048 WMIC.exe Token: SeSystemEnvironmentPrivilege 5048 WMIC.exe Token: SeRemoteShutdownPrivilege 5048 WMIC.exe Token: SeUndockPrivilege 5048 WMIC.exe Token: SeManageVolumePrivilege 5048 WMIC.exe Token: 33 5048 WMIC.exe Token: 34 5048 WMIC.exe Token: 35 5048 WMIC.exe Token: 36 5048 WMIC.exe Token: SeIncreaseQuotaPrivilege 2452 WMIC.exe Token: SeSecurityPrivilege 2452 WMIC.exe Token: SeTakeOwnershipPrivilege 2452 WMIC.exe Token: SeLoadDriverPrivilege 2452 WMIC.exe Token: SeSystemProfilePrivilege 2452 WMIC.exe Token: SeSystemtimePrivilege 2452 WMIC.exe Token: SeProfSingleProcessPrivilege 2452 WMIC.exe Token: SeIncBasePriorityPrivilege 2452 WMIC.exe Token: SeCreatePagefilePrivilege 2452 WMIC.exe Token: SeBackupPrivilege 2452 WMIC.exe Token: SeRestorePrivilege 2452 WMIC.exe Token: SeShutdownPrivilege 2452 WMIC.exe Token: SeDebugPrivilege 2452 WMIC.exe Token: SeSystemEnvironmentPrivilege 2452 WMIC.exe Token: SeRemoteShutdownPrivilege 2452 WMIC.exe Token: SeUndockPrivilege 2452 WMIC.exe Token: SeManageVolumePrivilege 2452 WMIC.exe Token: 33 2452 WMIC.exe Token: 34 2452 WMIC.exe Token: 35 2452 WMIC.exe Token: 36 2452 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1504 wrote to memory of 5096 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 86 PID 1504 wrote to memory of 5096 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 86 PID 1504 wrote to memory of 5096 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 86 PID 1504 wrote to memory of 3200 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 91 PID 1504 wrote to memory of 3200 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 91 PID 1504 wrote to memory of 3200 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 91 PID 3200 wrote to memory of 3080 3200 cmd.exe 93 PID 3200 wrote to memory of 3080 3200 cmd.exe 93 PID 3200 wrote to memory of 3080 3200 cmd.exe 93 PID 1504 wrote to memory of 4584 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 96 PID 1504 wrote to memory of 4584 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 96 PID 1504 wrote to memory of 4584 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 96 PID 4584 wrote to memory of 5048 4584 cmd.exe 98 PID 4584 wrote to memory of 5048 4584 cmd.exe 98 PID 4584 wrote to memory of 5048 4584 cmd.exe 98 PID 4584 wrote to memory of 2452 4584 cmd.exe 99 PID 4584 wrote to memory of 2452 4584 cmd.exe 99 PID 4584 wrote to memory of 2452 4584 cmd.exe 99 PID 4584 wrote to memory of 1708 4584 cmd.exe 100 PID 4584 wrote to memory of 1708 4584 cmd.exe 100 PID 4584 wrote to memory of 1708 4584 cmd.exe 100 PID 4584 wrote to memory of 2976 4584 cmd.exe 101 PID 4584 wrote to memory of 2976 4584 cmd.exe 101 PID 4584 wrote to memory of 2976 4584 cmd.exe 101 PID 4584 wrote to memory of 3656 4584 cmd.exe 102 PID 4584 wrote to memory of 3656 4584 cmd.exe 102 PID 4584 wrote to memory of 3656 4584 cmd.exe 102 PID 4584 wrote to memory of 1088 4584 cmd.exe 103 PID 4584 wrote to memory of 1088 4584 cmd.exe 103 PID 4584 wrote to memory of 1088 4584 cmd.exe 103 PID 4584 wrote to memory of 1392 4584 cmd.exe 104 PID 4584 wrote to memory of 1392 4584 cmd.exe 104 PID 4584 wrote to memory of 1392 4584 cmd.exe 104 PID 4584 wrote to memory of 4524 4584 cmd.exe 105 PID 4584 wrote to memory of 4524 4584 cmd.exe 105 PID 4584 wrote to memory of 4524 4584 cmd.exe 105 PID 4584 wrote to memory of 3476 4584 cmd.exe 106 PID 4584 wrote to memory of 3476 4584 cmd.exe 106 PID 4584 wrote to memory of 3476 4584 cmd.exe 106 PID 4584 wrote to memory of 4424 4584 cmd.exe 107 PID 4584 wrote to memory of 4424 4584 cmd.exe 107 PID 4584 wrote to memory of 4424 4584 cmd.exe 107 PID 1504 wrote to memory of 1092 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 108 PID 1504 wrote to memory of 1092 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 108 PID 1504 wrote to memory of 1092 1504 25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe 108 PID 1092 wrote to memory of 4324 1092 cmd.exe 110 PID 1092 wrote to memory of 4324 1092 cmd.exe 110 PID 1092 wrote to memory of 4324 1092 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe"C:\Users\Admin\AppData\Local\Temp\25ca4bdc98d6a2178eb4717abe15b16332bce18014e0d7da0d5415999aa8a17a.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\SysWOW64\vrvctl.ocx"2⤵PID:5096
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc start vrvwatchserver2⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\sc.exesc start vrvwatchserver3⤵
- Launches sc.exe
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic process where "name='watchclient.exe' " call Terminate & wmic process where "name='vrvsafec.exe' " call Terminate & wmic process where "name='vrvsafec64.exe' " call Terminate & wmic process where "name='edpvistadlg.exe' " call Terminate & wmic process where "name='vrvedp_m.exe' " call Terminate & wmic process where "name='vrvrf_c.exe' " call Terminate & wmic process where "name='vrvrf_c64.exe' " call Terminate & wmic process where "name='edptrayicon.exe' " call Terminate & wmic process where "name='DLPTray.exe' " call Terminate & wmic process where "name='EdpXcltSkin.exe' " call Terminate exit2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='watchclient.exe' " call Terminate3⤵
- Kills process with WMI
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='vrvsafec.exe' " call Terminate3⤵
- Kills process with WMI
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='vrvsafec64.exe' " call Terminate3⤵
- Kills process with WMI
PID:1708
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='edpvistadlg.exe' " call Terminate3⤵
- Kills process with WMI
PID:2976
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='vrvedp_m.exe' " call Terminate3⤵
- Kills process with WMI
PID:3656
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='vrvrf_c.exe' " call Terminate3⤵
- Kills process with WMI
PID:1088
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='vrvrf_c64.exe' " call Terminate3⤵
- Kills process with WMI
PID:1392
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='edptrayicon.exe' " call Terminate3⤵
- Kills process with WMI
PID:4524
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='DLPTray.exe' " call Terminate3⤵
- Kills process with WMI
PID:3476
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic process where "name='EdpXcltSkin.exe' " call Terminate exit3⤵
- Kills process with WMI
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc start vrvwatchserver2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\sc.exesc start vrvwatchserver3⤵
- Launches sc.exe
PID:4324
-
-