Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:38
Static task
static1
Behavioral task
behavioral1
Sample
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe
Resource
win10v2004-20220901-en
General
-
Target
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe
-
Size
48KB
-
MD5
a559acfaa60a579b39ae7fd276ae3d9e
-
SHA1
e9b679c67fd1b280f8c3e08d51c2f326160c8c5d
-
SHA256
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5
-
SHA512
9ccf11d6a613bc918b2fca794699144049edbf5a8f691268a6861475df51682e6d8956a6e843e8a2a98bfc8f80383805231c6f3b13b183f9245f86795cd0ac03
-
SSDEEP
768:bQ5hdL6QjWUGmrQZi+LtmtnB7CwgbLaTTIIMdzstb:q2UGdiOt2nBGl+TKdzstb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vgtdcg.exepid process 1624 vgtdcg.exe -
Loads dropped DLL 2 IoCs
Processes:
WerFault.exepid process 768 WerFault.exe 768 WerFault.exe -
Drops file in System32 directory 2 IoCs
Processes:
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exedescription ioc process File created C:\Windows\SysWOW64\vgtdcg.exe c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe File opened for modification C:\Windows\SysWOW64\vgtdcg.exe c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1720 1708 WerFault.exe c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe 768 1624 WerFault.exe vgtdcg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exevgtdcg.exepid process 1708 c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe 1708 c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe 1624 vgtdcg.exe 1624 vgtdcg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exevgtdcg.exedescription pid process target process PID 1708 wrote to memory of 1720 1708 c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe WerFault.exe PID 1708 wrote to memory of 1720 1708 c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe WerFault.exe PID 1708 wrote to memory of 1720 1708 c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe WerFault.exe PID 1708 wrote to memory of 1720 1708 c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe WerFault.exe PID 1624 wrote to memory of 768 1624 vgtdcg.exe WerFault.exe PID 1624 wrote to memory of 768 1624 vgtdcg.exe WerFault.exe PID 1624 wrote to memory of 768 1624 vgtdcg.exe WerFault.exe PID 1624 wrote to memory of 768 1624 vgtdcg.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe"C:\Users\Admin\AppData\Local\Temp\c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 1162⤵
- Program crash
-
C:\Windows\SysWOW64\vgtdcg.exeC:\Windows\SysWOW64\vgtdcg.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1882⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\vgtdcg.exeFilesize
48KB
MD5a559acfaa60a579b39ae7fd276ae3d9e
SHA1e9b679c67fd1b280f8c3e08d51c2f326160c8c5d
SHA256c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5
SHA5129ccf11d6a613bc918b2fca794699144049edbf5a8f691268a6861475df51682e6d8956a6e843e8a2a98bfc8f80383805231c6f3b13b183f9245f86795cd0ac03
-
\Windows\SysWOW64\vgtdcg.exeFilesize
48KB
MD5a559acfaa60a579b39ae7fd276ae3d9e
SHA1e9b679c67fd1b280f8c3e08d51c2f326160c8c5d
SHA256c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5
SHA5129ccf11d6a613bc918b2fca794699144049edbf5a8f691268a6861475df51682e6d8956a6e843e8a2a98bfc8f80383805231c6f3b13b183f9245f86795cd0ac03
-
\Windows\SysWOW64\vgtdcg.exeFilesize
48KB
MD5a559acfaa60a579b39ae7fd276ae3d9e
SHA1e9b679c67fd1b280f8c3e08d51c2f326160c8c5d
SHA256c38253f8d773c3b3d9a0ddc6a46464014d2568221cbe8a9fccadeb8a2de303e5
SHA5129ccf11d6a613bc918b2fca794699144049edbf5a8f691268a6861475df51682e6d8956a6e843e8a2a98bfc8f80383805231c6f3b13b183f9245f86795cd0ac03
-
memory/768-56-0x0000000000000000-mapping.dmp
-
memory/1720-55-0x0000000000000000-mapping.dmp