Analysis
-
max time kernel
220s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 15:20
Static task
static1
Behavioral task
behavioral1
Sample
af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe
Resource
win10v2004-20220812-en
General
-
Target
af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe
-
Size
636KB
-
MD5
ecb0c16d3841ac90be6c7088a4318796
-
SHA1
628afc91a2b250a8ec003c29e72522ceb2271172
-
SHA256
af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9
-
SHA512
58cb7005206dcad9afab7a0a0c5065cbff13ffe8d227c13ab0e3d485aa7366453339196419a546680dbb365b76636c0f1c1fd0002600e306d12cc57312d20696
-
SSDEEP
12288:woZB7TepbosaV5jTuQzA6VPSrAtQwbafJOMIXlpZVv7GCckZWu+KfsX36j96g:woZo7i5uQz9VPEfwbuJOMI19vqChZW3e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1160 vbc.exe -
Loads dropped DLL 1 IoCs
pid Process 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 428 set thread context of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28 PID 428 wrote to memory of 1160 428 af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe"C:\Users\Admin\AppData\Local\Temp\af03c3debd39ad7009d9c1f3f7c804479a5b3f45db7834da301185be946c36c9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Executes dropped EXE
PID:1160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98