Analysis
-
max time kernel
147s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe
Resource
win10v2004-20220812-en
General
-
Target
026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe
-
Size
380KB
-
MD5
fafde24964baa607df550e6c0b69606a
-
SHA1
8205755fa88be0262289732c316ef515e49f788e
-
SHA256
026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9
-
SHA512
602e507c579c6f2ae76eee39f101c32cd36e94b4ea9e696fed8a589c9bbb5fb929fe23284f608bd590be496ea1b259a0adbb6a5633e9f519496d55211b219a0a
-
SSDEEP
6144:A7gB1ZRiwyU/nr7jqd/hhdH5E4iGJjRJ2WHFEg1Af0XbJwqcP8ha7dBby:AMCmOZFWg1M020hcBb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1480 vcflye.exe 1712 vcflye.exe -
Creates a Windows Service
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\vcflye.exe 026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe File opened for modification C:\Windows\vcflye.exe 026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vcflye.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vcflye.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum vcflye.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" vcflye.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum vcflye.exe Key created \REGISTRY\USER\.DEFAULT\Software vcflye.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft vcflye.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie vcflye.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe 1712 vcflye.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 872 026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1712 1480 vcflye.exe 28 PID 1480 wrote to memory of 1712 1480 vcflye.exe 28 PID 1480 wrote to memory of 1712 1480 vcflye.exe 28 PID 1480 wrote to memory of 1712 1480 vcflye.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe"C:\Users\Admin\AppData\Local\Temp\026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
PID:872
-
C:\Windows\vcflye.exeC:\Windows\vcflye.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\vcflye.exeC:\Windows\vcflye.exe Win72⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5fafde24964baa607df550e6c0b69606a
SHA18205755fa88be0262289732c316ef515e49f788e
SHA256026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9
SHA512602e507c579c6f2ae76eee39f101c32cd36e94b4ea9e696fed8a589c9bbb5fb929fe23284f608bd590be496ea1b259a0adbb6a5633e9f519496d55211b219a0a
-
Filesize
380KB
MD5fafde24964baa607df550e6c0b69606a
SHA18205755fa88be0262289732c316ef515e49f788e
SHA256026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9
SHA512602e507c579c6f2ae76eee39f101c32cd36e94b4ea9e696fed8a589c9bbb5fb929fe23284f608bd590be496ea1b259a0adbb6a5633e9f519496d55211b219a0a
-
Filesize
380KB
MD5fafde24964baa607df550e6c0b69606a
SHA18205755fa88be0262289732c316ef515e49f788e
SHA256026afe8c0c6da4d8c654db281f45c68acf5446567363277d546c3479b610f6e9
SHA512602e507c579c6f2ae76eee39f101c32cd36e94b4ea9e696fed8a589c9bbb5fb929fe23284f608bd590be496ea1b259a0adbb6a5633e9f519496d55211b219a0a