Analysis
-
max time kernel
125s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe
Resource
win10v2004-20221111-en
General
-
Target
57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe
-
Size
90KB
-
MD5
a422ccb7278ddf149d064c32e229ef0a
-
SHA1
e8bda017353460b535eaf2fb9d5a31400471a552
-
SHA256
57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470
-
SHA512
f8410dd9470b1ab9e0415a83026c52d91f06fc6a94b1632cc1566c939769eb2bea96068fc01227e654077de32376855dafd74e568aa14f770883be8a7b56c715
-
SSDEEP
1536:VrNmxa47ML43F0j2uv+8rUGR49cSSSSSPSSSSyM7tba/VFdSSSSSSSSSSSSSaeUU:VwEcMk10jxv+8QGR/SSSSSPSSSSyMZOA
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\22119 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mstiukfqw.bat" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\svchost.exe" 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mstiukfqw.bat svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\MICROS~1.NET\FRAMEW~1\V20~1.507\vbc.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 796 vbc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 796 vbc.exe 796 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 2040 wrote to memory of 796 2040 57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe 28 PID 796 wrote to memory of 760 796 vbc.exe 29 PID 796 wrote to memory of 760 796 vbc.exe 29 PID 796 wrote to memory of 760 796 vbc.exe 29 PID 796 wrote to memory of 760 796 vbc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe"C:\Users\Admin\AppData\Local\Temp\57cc0a186a804d2acf1957406f8c738642b63a9178e9ac0c227c12331794a470.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:760
-
-