Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 18:28

General

  • Target

    bf320134340e8ea68572a1dd1804975ed77503f380c512ec00e96ea9b759ef95.exe

  • Size

    176KB

  • MD5

    378e425030307aad6c8c6f893c7a8e97

  • SHA1

    460a24628f079a4cdfa5a8a776796fa14cb901d7

  • SHA256

    bf320134340e8ea68572a1dd1804975ed77503f380c512ec00e96ea9b759ef95

  • SHA512

    821cf03ab31e36eaa0eb388d8bbad04afcc6c7c9f6fa8a941c0f560568965767db67b32c81fdc5275a024db393fa1e2d6dbd6c28cc7b353ad463800d541fbc97

  • SSDEEP

    3072:rHA5Hnpxjp7IFvk1iPo7brqseJQmL2VgLfnnXa0tRYyWcDoRQFQDU47TVPYZmxpC:bALIF81T7Hg2mLfznqIR9NDM0QZBPY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf320134340e8ea68572a1dd1804975ed77503f380c512ec00e96ea9b759ef95.exe
    "C:\Users\Admin\AppData\Local\Temp\bf320134340e8ea68572a1dd1804975ed77503f380c512ec00e96ea9b759ef95.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\vcdmd.dll",AGetVolume
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1212
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1964
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275461 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\vcdmd.dll

    Filesize

    176KB

    MD5

    7a82a6c6012081aa8f1c99b1c9bce113

    SHA1

    3b5896ea07a5f66b1c79e12135985c79caaf4067

    SHA256

    b3eb71748ea458ce37665ea8618d07e12e31fd06d9a3bfb4038f91f8928ce1fd

    SHA512

    5f1e606a6601bd8ea83c2dcc68c323e93a4e8cbf0a0d9ea335b81cdfb972ac09f20469a9f541c09187671ee3df098e379419ef1b2745ea0254009f110a92a94b

  • \Users\Admin\AppData\Roaming\vcdmd.dll

    Filesize

    176KB

    MD5

    7a82a6c6012081aa8f1c99b1c9bce113

    SHA1

    3b5896ea07a5f66b1c79e12135985c79caaf4067

    SHA256

    b3eb71748ea458ce37665ea8618d07e12e31fd06d9a3bfb4038f91f8928ce1fd

    SHA512

    5f1e606a6601bd8ea83c2dcc68c323e93a4e8cbf0a0d9ea335b81cdfb972ac09f20469a9f541c09187671ee3df098e379419ef1b2745ea0254009f110a92a94b

  • \Users\Admin\AppData\Roaming\vcdmd.dll

    Filesize

    176KB

    MD5

    7a82a6c6012081aa8f1c99b1c9bce113

    SHA1

    3b5896ea07a5f66b1c79e12135985c79caaf4067

    SHA256

    b3eb71748ea458ce37665ea8618d07e12e31fd06d9a3bfb4038f91f8928ce1fd

    SHA512

    5f1e606a6601bd8ea83c2dcc68c323e93a4e8cbf0a0d9ea335b81cdfb972ac09f20469a9f541c09187671ee3df098e379419ef1b2745ea0254009f110a92a94b

  • \Users\Admin\AppData\Roaming\vcdmd.dll

    Filesize

    176KB

    MD5

    7a82a6c6012081aa8f1c99b1c9bce113

    SHA1

    3b5896ea07a5f66b1c79e12135985c79caaf4067

    SHA256

    b3eb71748ea458ce37665ea8618d07e12e31fd06d9a3bfb4038f91f8928ce1fd

    SHA512

    5f1e606a6601bd8ea83c2dcc68c323e93a4e8cbf0a0d9ea335b81cdfb972ac09f20469a9f541c09187671ee3df098e379419ef1b2745ea0254009f110a92a94b

  • \Users\Admin\AppData\Roaming\vcdmd.dll

    Filesize

    176KB

    MD5

    7a82a6c6012081aa8f1c99b1c9bce113

    SHA1

    3b5896ea07a5f66b1c79e12135985c79caaf4067

    SHA256

    b3eb71748ea458ce37665ea8618d07e12e31fd06d9a3bfb4038f91f8928ce1fd

    SHA512

    5f1e606a6601bd8ea83c2dcc68c323e93a4e8cbf0a0d9ea335b81cdfb972ac09f20469a9f541c09187671ee3df098e379419ef1b2745ea0254009f110a92a94b

  • memory/1212-69-0x0000000000190000-0x00000000001BF000-memory.dmp

    Filesize

    188KB

  • memory/1212-73-0x0000000000120000-0x0000000000135000-memory.dmp

    Filesize

    84KB

  • memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB

  • memory/1448-55-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/1448-56-0x0000000000250000-0x000000000027F000-memory.dmp

    Filesize

    188KB

  • memory/1448-60-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB