Analysis
-
max time kernel
224s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe
Resource
win10v2004-20221111-en
General
-
Target
ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe
-
Size
1024KB
-
MD5
42bb29ede66f4db50a75c1a507658aca
-
SHA1
c048235714e7856645e352d5e0901f4cca181276
-
SHA256
ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df
-
SHA512
46bf5b4fa80cab81e31c952afdca731f81e838cc421fac89cb39f27d3d73b249dd71b6a05b1f760b9733733b7699879504f05f5638d28c3ba7ff4b8959809360
-
SSDEEP
6144:CAkyLqS1lXT/tPnXGS9COsvX6/a5o2BAHFEWP0DiSqVLTAJ97Jhn6V70ttJ:xvTll9DG6/aBGECIiLLTf70t
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List vbc.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall Manager\\cfmmon.exe" vbc.exe -
Executes dropped EXE 1 IoCs
pid Process 1540 cfmmon.exe -
Loads dropped DLL 1 IoCs
pid Process 396 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall Manager\\cfmmon.exe" vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1516 set thread context of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1448 set thread context of 396 1448 vbc.exe 29 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1516 wrote to memory of 1448 1516 ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe 28 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 1448 wrote to memory of 396 1448 vbc.exe 29 PID 396 wrote to memory of 1540 396 vbc.exe 30 PID 396 wrote to memory of 1540 396 vbc.exe 30 PID 396 wrote to memory of 1540 396 vbc.exe 30 PID 396 wrote to memory of 1540 396 vbc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe"C:\Users\Admin\AppData\Local\Temp\ace5375c3af06262bad57cb5060ca7cd30a24f586e4a4e86129f32f6d10708df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe"C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe" in4⤵
- Executes dropped EXE
PID:1540
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55dcf3b1c908361d8d3e4247e4cef608f
SHA1d0f63b1215812ee7a95420392e1d4059d8ee7519
SHA256f293f89f197d1e50302d7990f18b744cb0bba464044da761b7de7d0c7eda2251
SHA5123b0af7f2db47c73cc4cfa108dab770095c41b33556a444d94ee981f85155cffc7d61cce765f727f99e90ebd566a3004a43b7051b75f4b1907d6438d1383fb7d8
-
Filesize
1.1MB
MD55dcf3b1c908361d8d3e4247e4cef608f
SHA1d0f63b1215812ee7a95420392e1d4059d8ee7519
SHA256f293f89f197d1e50302d7990f18b744cb0bba464044da761b7de7d0c7eda2251
SHA5123b0af7f2db47c73cc4cfa108dab770095c41b33556a444d94ee981f85155cffc7d61cce765f727f99e90ebd566a3004a43b7051b75f4b1907d6438d1383fb7d8
-
Filesize
1.1MB
MD55dcf3b1c908361d8d3e4247e4cef608f
SHA1d0f63b1215812ee7a95420392e1d4059d8ee7519
SHA256f293f89f197d1e50302d7990f18b744cb0bba464044da761b7de7d0c7eda2251
SHA5123b0af7f2db47c73cc4cfa108dab770095c41b33556a444d94ee981f85155cffc7d61cce765f727f99e90ebd566a3004a43b7051b75f4b1907d6438d1383fb7d8