Analysis

  • max time kernel
    206s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 09:13

General

  • Target

    fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7.exe

  • Size

    76KB

  • MD5

    980c2a5956ee18cfd60d17f899ee3115

  • SHA1

    3d146224490bd8473565a994af03559eb3d335c6

  • SHA256

    fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7

  • SHA512

    c0a11a748da1d2692a934a6052b32b23b7a9f47dc56d3ae8fd88779a2089a19caa370042010ed5c313aebe45149a6a8d07b294a4394a71978d2d89ffcaed3712

  • SSDEEP

    1536:xDxbxMhRI3Jihyd3js7A6s74tBTF3s0loJTljub8:xDxbxMhRI3IhKjR7iH3VoTl1

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7.exe
    "C:\Users\Admin\AppData\Local\Temp\fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7.exe
      C:\Users\Admin\AppData\Local\Temp\fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7.exe
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\WINDVBR.EXE
        "C:\Windows\WINDVBR.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\WINDVBR.EXE
          C:\Windows\WINDVBR.EXE
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:1772

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1214520366-621468234-4062160515-1000\699c4b9cdebca7aaea5193cae8a50098_48ba80a0-b4f2-4449-9b22-a470b66c8a87

          Filesize

          50B

          MD5

          5b63d4dd8c04c88c0e30e494ec6a609a

          SHA1

          884d5a8bdc25fe794dc22ef9518009dcf0069d09

          SHA256

          4d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd

          SHA512

          15ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb

        • C:\Windows\WINDVBR.EXE

          Filesize

          76KB

          MD5

          980c2a5956ee18cfd60d17f899ee3115

          SHA1

          3d146224490bd8473565a994af03559eb3d335c6

          SHA256

          fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7

          SHA512

          c0a11a748da1d2692a934a6052b32b23b7a9f47dc56d3ae8fd88779a2089a19caa370042010ed5c313aebe45149a6a8d07b294a4394a71978d2d89ffcaed3712

        • C:\Windows\WINDVBR.EXE

          Filesize

          76KB

          MD5

          980c2a5956ee18cfd60d17f899ee3115

          SHA1

          3d146224490bd8473565a994af03559eb3d335c6

          SHA256

          fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7

          SHA512

          c0a11a748da1d2692a934a6052b32b23b7a9f47dc56d3ae8fd88779a2089a19caa370042010ed5c313aebe45149a6a8d07b294a4394a71978d2d89ffcaed3712

        • C:\Windows\WINDVBR.exe

          Filesize

          76KB

          MD5

          980c2a5956ee18cfd60d17f899ee3115

          SHA1

          3d146224490bd8473565a994af03559eb3d335c6

          SHA256

          fe4d37b2cb758773830a785ed89020e7d31a58a03397221cd93ce0cacb87b7d7

          SHA512

          c0a11a748da1d2692a934a6052b32b23b7a9f47dc56d3ae8fd88779a2089a19caa370042010ed5c313aebe45149a6a8d07b294a4394a71978d2d89ffcaed3712

        • memory/1020-56-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/1020-59-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/1020-60-0x00000000763D1000-0x00000000763D3000-memory.dmp

          Filesize

          8KB

        • memory/1020-73-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/1772-74-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB