Analysis
-
max time kernel
600s -
max time network
606s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe
Resource
win10v2004-20221111-en
General
-
Target
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe
-
Size
143KB
-
MD5
0cb3ac7cd47ab4deba79940a33ec102c
-
SHA1
970f1e1a4ee74b5888be4feff5e83d35f1b060a1
-
SHA256
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0
-
SHA512
534b914537050035f556b9bdaac7207f2e64086a51c41ae52942bccc38e4dd43eaf94f69bc36fd5f6bdad54d632fd098cf5bd313c2ca61788937c954ea44e501
-
SSDEEP
1536:P1zYivgd088b+ZZawx3NOYdTOghkEuVKuTzZiwX3SCnOqA5tNQ1xY7sjg7HUXQy:P1zQZISiMwzZiwXiCo5nmi7sjg7HUgy
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exedescription pid process target process PID 4996 set thread context of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exepid process 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.execmd.exedescription pid process target process PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 5080 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe vbc.exe PID 4996 wrote to memory of 4364 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 4364 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 4364 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 320 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 320 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 320 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 2864 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 2864 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 4996 wrote to memory of 2864 4996 75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe cmd.exe PID 320 wrote to memory of 4368 320 cmd.exe schtasks.exe PID 320 wrote to memory of 4368 320 cmd.exe schtasks.exe PID 320 wrote to memory of 4368 320 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe"C:\Users\Admin\AppData\Local\Temp\75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon"2⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe'" /f3⤵
- Creates scheduled task(s)
PID:4368 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\75219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0.exe" "C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe"2⤵PID:2864