Analysis
-
max time kernel
88s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe
Resource
win10v2004-20220901-en
General
-
Target
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe
-
Size
524KB
-
MD5
015f34e50549208531450e253bb2f064
-
SHA1
30869dffd8af104fead2409e83ab07c730f14516
-
SHA256
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939
-
SHA512
8d934fad50a1efb6dc5f8b25ab8b11a3ccf598c73a988acd94afffb17ba1b202e0c8ac21364390268ddd7472fcab09defc95a6f6b91fe04448e59f6edaaffc27
-
SSDEEP
12288:3l0h4plprMRUul6NwrdYjeCYibcRLuYyYwZffu+rKO7GFV:3xrMRUuwGrdYjxYbuFZ3xx
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exevbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\mozilla = "C:\\Users\\Admin\\AppData\\Roaming\\mozilla\\xdLg6CAFvNN7.exe" ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exedescription pid process target process PID 972 set thread context of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exepid process 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exedescription pid process Token: SeDebugPrivilege 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exedescription pid process target process PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe PID 972 wrote to memory of 584 972 ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe"C:\Users\Admin\AppData\Local\Temp\ec31cebcf3cc2457a0d29c09841d4db251f05afe6962aa89fe09756b088ca939.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Adds Run key to start application
PID:584