Analysis
-
max time kernel
158s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe
Resource
win10v2004-20220812-en
General
-
Target
0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe
-
Size
246KB
-
MD5
c8463daea4102c69d04d025dc2a40639
-
SHA1
c10d84b0d9106d6c149065f983e60f93225b9f3c
-
SHA256
0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9
-
SHA512
a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc
-
SSDEEP
6144:pYiSDS6NLK9biG42JKsvt9tcjvpP90ZNMF2qIccnd:LSNFmz427vtPcjd90HA2q3yd
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4560 FD9D74533BF.exe 2848 FD9D74533BF.exe 3308 VUZ30C4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN VUZ30C4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9U7C6V4J7D2H3YVBJIQISWZQD = "C:\\Volume\\FD9D74533BF.exe" VUZ30C4.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 FD9D74533BF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum FD9D74533BF.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1188 set thread context of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 4560 set thread context of 2848 4560 FD9D74533BF.exe 80 -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" VUZ30C4.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\PhishingFilter VUZ30C4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" VUZ30C4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery VUZ30C4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" VUZ30C4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 2848 FD9D74533BF.exe 2848 FD9D74533BF.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe 3308 VUZ30C4.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe Token: SeDebugPrivilege 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe Token: SeDebugPrivilege 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe Token: SeDebugPrivilege 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe Token: SeDebugPrivilege 2848 FD9D74533BF.exe Token: SeDebugPrivilege 2848 FD9D74533BF.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe Token: SeDebugPrivilege 3308 VUZ30C4.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 1188 wrote to memory of 3240 1188 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 77 PID 3240 wrote to memory of 4560 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 78 PID 3240 wrote to memory of 4560 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 78 PID 3240 wrote to memory of 4560 3240 0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe 78 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 4560 wrote to memory of 2848 4560 FD9D74533BF.exe 80 PID 2848 wrote to memory of 3308 2848 FD9D74533BF.exe 81 PID 2848 wrote to memory of 3308 2848 FD9D74533BF.exe 81 PID 2848 wrote to memory of 3308 2848 FD9D74533BF.exe 81 PID 2848 wrote to memory of 3308 2848 FD9D74533BF.exe 81 PID 2848 wrote to memory of 3308 2848 FD9D74533BF.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe"C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exeC:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Volume\FD9D74533BF.exe"C:\Volume\FD9D74533BF.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Volume\FD9D74533BF.exeC:\Volume\FD9D74533BF.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\VUZ30C4.exe"C:\Users\Admin\AppData\Local\Temp\VUZ30C4.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
63KB
MD5ab687f60baf8c93020f6246363fc2298
SHA1dd8487583b7b093d2d4a953c4e77d84b29aee4a1
SHA256245441e9ca958c500903d33a5df07848e37ce54f786f46578251ca0552104cb5
SHA5128fae2d5696971394b8c839f13dfb7372a318e16016fad50933993f1798f228b3fef5dfc38ef85f8e14e811ebba8a1ffb295e2014e796605c613807364a1cf02a
-
Filesize
246KB
MD5c8463daea4102c69d04d025dc2a40639
SHA1c10d84b0d9106d6c149065f983e60f93225b9f3c
SHA2560df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9
SHA512a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc
-
Filesize
246KB
MD5c8463daea4102c69d04d025dc2a40639
SHA1c10d84b0d9106d6c149065f983e60f93225b9f3c
SHA2560df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9
SHA512a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc
-
Filesize
246KB
MD5c8463daea4102c69d04d025dc2a40639
SHA1c10d84b0d9106d6c149065f983e60f93225b9f3c
SHA2560df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9
SHA512a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc