Analysis
-
max time kernel
599s -
max time network
605s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe
Resource
win10v2004-20221111-en
General
-
Target
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe
-
Size
143KB
-
MD5
0cb3ac7cd47ab4deba79940a33ec102c
-
SHA1
970f1e1a4ee74b5888be4feff5e83d35f1b060a1
-
SHA256
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0
-
SHA512
534b914537050035f556b9bdaac7207f2e64086a51c41ae52942bccc38e4dd43eaf94f69bc36fd5f6bdad54d632fd098cf5bd313c2ca61788937c954ea44e501
-
SSDEEP
1536:P1zYivgd088b+ZZawx3NOYdTOghkEuVKuTzZiwX3SCnOqA5tNQ1xY7sjg7HUXQy:P1zQZISiMwzZiwXiCo5nmi7sjg7HUgy
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exedescription pid process target process PID 1416 set thread context of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exepid process 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.execmd.exedescription pid process target process PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 112 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 1416 wrote to memory of 684 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 684 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 684 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 684 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 580 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 580 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 580 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 580 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 568 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 568 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 568 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 1416 wrote to memory of 568 1416 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 580 wrote to memory of 1948 580 cmd.exe schtasks.exe PID 580 wrote to memory of 1948 580 cmd.exe schtasks.exe PID 580 wrote to memory of 1948 580 cmd.exe schtasks.exe PID 580 wrote to memory of 1948 580 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe"C:\Users\Admin\AppData\Local\Temp\75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:112
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon"2⤵PID:684
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe'" /f3⤵
- Creates scheduled task(s)
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe" "C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe"2⤵PID:568
-
C:\Windows\system32\taskeng.exetaskeng.exe {062F8956-B5D5-4C4F-B1CD-1F23CEB99284} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵PID:1520