Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe
Resource
win10v2004-20221111-en
General
-
Target
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe
-
Size
307KB
-
MD5
23d23e7f1a274b773003eee67dc596be
-
SHA1
be22e91f666b0906ec2b6ec1226ad9857d465057
-
SHA256
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f
-
SHA512
69d20ca99f781c0a3b75e3a800586c5dc1bbde00a61f2826ef9eaeab1619a019126fcfaf929306e3562685990f5bba4447695f3fbb01d17c391a806fc67deb34
-
SSDEEP
6144:c2zydZlCjJW1RUpzYMDr+izzJwr1KHrECeykKTeEpSYRrc07qi7+M1GyRz:c2ydZlCjJWkFDDx15kKThPgk7+0X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vata.exepid process 1128 vata.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2044 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exepid process 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vata.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run vata.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Tavufu\\vata.exe" vata.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exedescription pid process target process PID 1448 set thread context of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe -
Processes:
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
vata.exepid process 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe 1128 vata.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exevata.exedescription pid process target process PID 1448 wrote to memory of 1128 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe vata.exe PID 1448 wrote to memory of 1128 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe vata.exe PID 1448 wrote to memory of 1128 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe vata.exe PID 1448 wrote to memory of 1128 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe vata.exe PID 1128 wrote to memory of 1248 1128 vata.exe taskhost.exe PID 1128 wrote to memory of 1248 1128 vata.exe taskhost.exe PID 1128 wrote to memory of 1248 1128 vata.exe taskhost.exe PID 1128 wrote to memory of 1248 1128 vata.exe taskhost.exe PID 1128 wrote to memory of 1248 1128 vata.exe taskhost.exe PID 1128 wrote to memory of 1360 1128 vata.exe Dwm.exe PID 1128 wrote to memory of 1360 1128 vata.exe Dwm.exe PID 1128 wrote to memory of 1360 1128 vata.exe Dwm.exe PID 1128 wrote to memory of 1360 1128 vata.exe Dwm.exe PID 1128 wrote to memory of 1360 1128 vata.exe Dwm.exe PID 1128 wrote to memory of 1392 1128 vata.exe Explorer.EXE PID 1128 wrote to memory of 1392 1128 vata.exe Explorer.EXE PID 1128 wrote to memory of 1392 1128 vata.exe Explorer.EXE PID 1128 wrote to memory of 1392 1128 vata.exe Explorer.EXE PID 1128 wrote to memory of 1392 1128 vata.exe Explorer.EXE PID 1128 wrote to memory of 1448 1128 vata.exe 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe PID 1128 wrote to memory of 1448 1128 vata.exe 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe PID 1128 wrote to memory of 1448 1128 vata.exe 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe PID 1128 wrote to memory of 1448 1128 vata.exe 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe PID 1128 wrote to memory of 1448 1128 vata.exe 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe PID 1448 wrote to memory of 2044 1448 6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe"C:\Users\Admin\AppData\Local\Temp\6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\Tavufu\vata.exe"C:\Users\Admin\AppData\Roaming\Tavufu\vata.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f1abfa4.bat"3⤵
- Deletes itself
PID:2044
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5737a158236ae10c69cfb6672602d2fba
SHA1700c8e88af3aebf27e472f632dc3730ca112d3cd
SHA256b8a0a7aad881b0c644aac0423222426db959f66c1dfe2ef3fbd6b877aea38129
SHA512d877d1e173160ab241211d0121eafc3cf1a2f7350cddae6b469fa21a232d32c8062722477f8b47b8cc215282a03d7d2be494fd9468a2ce2e0673a26a9b19b5da
-
Filesize
307KB
MD548bb48d7247742d79aa72e67ba5c6131
SHA12d262b15974dd1b9dd46cb159b7da56f5cc86e07
SHA256b53f0069dfc3ba2cc47be7b55275a76245586c1ada6d5c5d678c494b01208154
SHA512ec9ae6b5c876d944f4ce076131e7041e69ea1c8dcc2d1fa5047cb052e27366d461f3613eb5461ffbb951d48bfe1c16d3fbae7392a0c9cd8015a2bcab217d3dba
-
Filesize
307KB
MD548bb48d7247742d79aa72e67ba5c6131
SHA12d262b15974dd1b9dd46cb159b7da56f5cc86e07
SHA256b53f0069dfc3ba2cc47be7b55275a76245586c1ada6d5c5d678c494b01208154
SHA512ec9ae6b5c876d944f4ce076131e7041e69ea1c8dcc2d1fa5047cb052e27366d461f3613eb5461ffbb951d48bfe1c16d3fbae7392a0c9cd8015a2bcab217d3dba
-
Filesize
307KB
MD548bb48d7247742d79aa72e67ba5c6131
SHA12d262b15974dd1b9dd46cb159b7da56f5cc86e07
SHA256b53f0069dfc3ba2cc47be7b55275a76245586c1ada6d5c5d678c494b01208154
SHA512ec9ae6b5c876d944f4ce076131e7041e69ea1c8dcc2d1fa5047cb052e27366d461f3613eb5461ffbb951d48bfe1c16d3fbae7392a0c9cd8015a2bcab217d3dba