Analysis
-
max time kernel
47s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe
Resource
win7-20220901-en
General
-
Target
8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe
-
Size
1.4MB
-
MD5
88ff858fbf8ce54b768251482847d93f
-
SHA1
f8584a80e775b2405012d2b1e11a0329b62ae726
-
SHA256
8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74
-
SHA512
fef48aa401736f57d681500413b8d7ae2905504e43cdf55d98213ef0cdf870660e5e54e1b4a2fca2472ba75a812b017896301c1678ef7f4c49fb06a6bd0dfc6d
-
SSDEEP
24576:bdzclqN0oM7izRiDK8JKCT4EgDVVwIaoYyGSaci34gZ3:J5NcizRitK64EgDVVwIXYvSri3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1992 vbc.exe 592 lampada.exe -
Loads dropped DLL 3 IoCs
pid Process 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 1992 vbc.exe 1992 vbc.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2016 set thread context of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 2016 wrote to memory of 1992 2016 8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe 27 PID 1992 wrote to memory of 592 1992 vbc.exe 28 PID 1992 wrote to memory of 592 1992 vbc.exe 28 PID 1992 wrote to memory of 592 1992 vbc.exe 28 PID 1992 wrote to memory of 592 1992 vbc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe"C:\Users\Admin\AppData\Local\Temp\8ce5f15cb9493099cbad51f79f7a559bc4af34723f7a078fce01e73ba967ed74.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\lampada.exe"C:\Users\Admin\AppData\Local\Temp\lampada.exe"3⤵
- Executes dropped EXE
PID:592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD52e74069ae0496d2ce69e6564a8e517f6
SHA1b1e42e7d30b73c82d643d4c855a4efe443e6533c
SHA2569243b704cf770e28fff1bb93f86df4bea94ca21faedaa8a5185469ee5d16920b
SHA512e03efa86db8344fee02804d6d9ff3192869b5b53288d65299aede8e5715dd4b40c4618586638ed954a70f51d9b9535a81766e32df6f8125f80acd73dc55837c6
-
Filesize
842KB
MD52e74069ae0496d2ce69e6564a8e517f6
SHA1b1e42e7d30b73c82d643d4c855a4efe443e6533c
SHA2569243b704cf770e28fff1bb93f86df4bea94ca21faedaa8a5185469ee5d16920b
SHA512e03efa86db8344fee02804d6d9ff3192869b5b53288d65299aede8e5715dd4b40c4618586638ed954a70f51d9b9535a81766e32df6f8125f80acd73dc55837c6
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
842KB
MD52e74069ae0496d2ce69e6564a8e517f6
SHA1b1e42e7d30b73c82d643d4c855a4efe443e6533c
SHA2569243b704cf770e28fff1bb93f86df4bea94ca21faedaa8a5185469ee5d16920b
SHA512e03efa86db8344fee02804d6d9ff3192869b5b53288d65299aede8e5715dd4b40c4618586638ed954a70f51d9b9535a81766e32df6f8125f80acd73dc55837c6
-
Filesize
842KB
MD52e74069ae0496d2ce69e6564a8e517f6
SHA1b1e42e7d30b73c82d643d4c855a4efe443e6533c
SHA2569243b704cf770e28fff1bb93f86df4bea94ca21faedaa8a5185469ee5d16920b
SHA512e03efa86db8344fee02804d6d9ff3192869b5b53288d65299aede8e5715dd4b40c4618586638ed954a70f51d9b9535a81766e32df6f8125f80acd73dc55837c6
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98