Analysis
-
max time kernel
71s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe
Resource
win10v2004-20220901-en
General
-
Target
b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe
-
Size
348KB
-
MD5
47a0b307f91153244e04993f9b0f860c
-
SHA1
5046525f6eb127b907de97a70e106506a1772d74
-
SHA256
b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13
-
SHA512
f1b23dc60d28c31a622135f872a1580a89cab1e729656c2f9cb69b314feb3bd9a123ef9cf0bf0c73d30e4ec2646876bb8a6d51bd7d1cfe74ad39c92bd5e3647c
-
SSDEEP
6144:Q5PjeSKCbi8H8WrT3+ANDFpbTTNFGLi9oH2VS3dFW4tc8QztFBkg:Q1eTC+qRv3+ABTTNEiW6S3dJe/3Bj
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1252 vdv.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1424-62-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/1424-67-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/1252-77-0x0000000000400000-0x00000000004F0000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1252 vdv.exe -
Loads dropped DLL 2 IoCs
pid Process 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 976 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: 33 1644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1644 AUDIODG.EXE Token: 33 1644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1644 AUDIODG.EXE Token: SeShutdownPrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1252 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 26 PID 1424 wrote to memory of 1252 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 26 PID 1424 wrote to memory of 1252 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 26 PID 1424 wrote to memory of 1252 1424 b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe"C:\Users\Admin\AppData\Local\Temp\b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\vdv.exe"C:\Users\Admin\AppData\Local\vdv.exe" -gav C:\Users\Admin\AppData\Local\Temp\b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1252
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD547a0b307f91153244e04993f9b0f860c
SHA15046525f6eb127b907de97a70e106506a1772d74
SHA256b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13
SHA512f1b23dc60d28c31a622135f872a1580a89cab1e729656c2f9cb69b314feb3bd9a123ef9cf0bf0c73d30e4ec2646876bb8a6d51bd7d1cfe74ad39c92bd5e3647c
-
Filesize
348KB
MD547a0b307f91153244e04993f9b0f860c
SHA15046525f6eb127b907de97a70e106506a1772d74
SHA256b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13
SHA512f1b23dc60d28c31a622135f872a1580a89cab1e729656c2f9cb69b314feb3bd9a123ef9cf0bf0c73d30e4ec2646876bb8a6d51bd7d1cfe74ad39c92bd5e3647c
-
Filesize
348KB
MD547a0b307f91153244e04993f9b0f860c
SHA15046525f6eb127b907de97a70e106506a1772d74
SHA256b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13
SHA512f1b23dc60d28c31a622135f872a1580a89cab1e729656c2f9cb69b314feb3bd9a123ef9cf0bf0c73d30e4ec2646876bb8a6d51bd7d1cfe74ad39c92bd5e3647c
-
Filesize
348KB
MD547a0b307f91153244e04993f9b0f860c
SHA15046525f6eb127b907de97a70e106506a1772d74
SHA256b31376da63c002359bc1bbc94795f36cc6f0a0a1ecee0c2f0f735722267ede13
SHA512f1b23dc60d28c31a622135f872a1580a89cab1e729656c2f9cb69b314feb3bd9a123ef9cf0bf0c73d30e4ec2646876bb8a6d51bd7d1cfe74ad39c92bd5e3647c