Analysis
-
max time kernel
99s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe
Resource
win10v2004-20220812-en
General
-
Target
Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe
-
Size
108KB
-
MD5
f745e3ebd4bd2b8f014a92428ea9efb1
-
SHA1
ae17fefd3c22ac6314123b0735e8f71fe314d98d
-
SHA256
bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
-
SHA512
6252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
SSDEEP
1536:/Vmfaqf7zjrhAc4nu/greNUMoewRBfefI3N3kOF7yhduMacoz5lD:/gff7acdIRgwjeg1/XJzD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2856 qeluvrjvhf.pre 4580 qeluvrjvhf.pre -
resource yara_rule behavioral2/memory/808-133-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/808-136-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/808-137-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/808-138-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4580-151-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5076 set thread context of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 2856 set thread context of 4580 2856 qeluvrjvhf.pre 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 2348 2292 WerFault.exe 86 -
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE,0" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE /p \"%1\"" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QELUVR~1.PRE,0" qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command qeluvrjvhf.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QELUVR~1.PRE /pt \"%1\" \"%2\" \"%3\" \"%4\"" qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\ = "Matrix Document" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE \"%1\"" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ = "Matrix.Document" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QELUVR~1.PRE /p \"%1\"" qeluvrjvhf.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew\NullFile Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document qeluvrjvhf.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\ = "Matrix Document" qeluvrjvhf.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ = "Matrix.Document" qeluvrjvhf.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew\NullFile qeluvrjvhf.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QELUVR~1.PRE \"%1\"" qeluvrjvhf.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command qeluvrjvhf.pre -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 2856 qeluvrjvhf.pre 2856 qeluvrjvhf.pre -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 2856 qeluvrjvhf.pre 2856 qeluvrjvhf.pre -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 5076 wrote to memory of 808 5076 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 82 PID 808 wrote to memory of 4572 808 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 83 PID 808 wrote to memory of 4572 808 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 83 PID 808 wrote to memory of 4572 808 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 83 PID 808 wrote to memory of 4572 808 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 83 PID 4572 wrote to memory of 2856 4572 svchost.exe 84 PID 4572 wrote to memory of 2856 4572 svchost.exe 84 PID 4572 wrote to memory of 2856 4572 svchost.exe 84 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 2856 wrote to memory of 4580 2856 qeluvrjvhf.pre 85 PID 4580 wrote to memory of 2292 4580 qeluvrjvhf.pre 86 PID 4580 wrote to memory of 2292 4580 qeluvrjvhf.pre 86 PID 4580 wrote to memory of 2292 4580 qeluvrjvhf.pre 86 PID 4580 wrote to memory of 2292 4580 qeluvrjvhf.pre 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\qeluvrjvhf.preC:\Users\Admin\AppData\Local\Temp\qeluvrjvhf.pre4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\qeluvrjvhf.preC:\Users\Admin\AppData\Local\Temp\qeluvrjvhf.pre5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 2847⤵
- Program crash
PID:2348
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2292 -ip 22921⤵PID:1104
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab