Analysis

  • max time kernel
    59s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2023, 05:49

General

  • Target

    Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.exe

  • Size

    8.1MB

  • MD5

    c3c2f4e4420c75c69a5033cc64947d51

  • SHA1

    4b0010618c908b897d657147ad9b21a646ddde32

  • SHA256

    5f202c5cd602839ffebf3ab1b308ddebc14f1fa8a3edd9e7876bfb5d057658dc

  • SHA512

    21c4df6a73808bb809d3c1dc83feb738161929ae76d863c1de1e96cbbbe21f92b347bf0b533b5f964ba2b2639d9d1f14f7553288d4294f30b5b667a83864cb07

  • SSDEEP

    196608:U38JJEU16hTZl583S0LJu+mzfDkzUoXOM1ught7SV:V1MlCC0Ybzf4zUoXN8AW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.exe
    "C:\Users\Admin\AppData\Local\Temp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Users\Admin\AppData\Local\Temp\is-D62Q9.tmp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-D62Q9.tmp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.tmp" /SL5="$80022,7540986,1235456,C:\Users\Admin\AppData\Local\Temp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://anonfiles.com/18c8D4Iay8/virtyu_lite_release_free_download_epic_swag_zip
        3⤵
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1416
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x570
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1224
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2040

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5c5bc81049f48e0a5064c3a464d65e98

      SHA1

      c9389a84a124bd236fa0d062fc0519138ad4ef28

      SHA256

      e9b1305e4070815e996d547c5859e6cd6617f8654389bdae0d867fffd27abf8d

      SHA512

      c852e3c2792a16f6d1b63e61c1c5ee26a749a8c37a60b1e4af6a6d74533b25fc91e6ecc252be8cb90aa51181b6ba6b390e437d715d5072b2a8f29791a38155fe

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      5KB

      MD5

      0d3e4a1432e3d429f5dba34dd1684805

      SHA1

      557691c0186175224e7c56637cd334f02a0b6f87

      SHA256

      1bfae1667302af179b52fc8b67fcb98b1ddaabcd7c903b6f3f167cf3c8e7ff3d

      SHA512

      64b9745d127b685865eea121facf22f76a6a933e706433de96f9b37af9f18cf3324b1b42b16a37a0a241c68b454a7a41e53ed95d1c481dcd050e321736aa3eb7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZN60M0QQ\virtyu lite release free download epic swag.zip.1fyignz.partial

      Filesize

      182KB

      MD5

      ecf4baadd2a0849636ae96618aef3057

      SHA1

      fe4c49585a842685dba91234441f9c7a699312b2

      SHA256

      c9237b2a55642a78a4b57a61a4c2f27abfe76cd53224b5e600e953d31f31eb79

      SHA512

      9c9a77f837b995fbaa8d5397830e71b087753b76669a50fd296e98d9d942f68071a1a59c406c401339076a008c025267a8a4c4e9a16e7cdd806269e698739e4f

    • C:\Users\Admin\AppData\Local\Temp\is-D62Q9.tmp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.tmp

      Filesize

      3.4MB

      MD5

      5e99bb58ef7c6511011212dcc2d7c54e

      SHA1

      8903f713ce95672cb10d6a6052173a60f87a8073

      SHA256

      b4a2171728f8801e9de60ccece4d9c02796c0b43249868ec571b1fb16d18a929

      SHA512

      21f484df6b1141f23863a71548e49a6af4af32008a1ba4664965b5a05ad7e1d934bd9ec97f8d7968d966d779612919ecf4639edfe4fe38723a688d2de1285be2

    • \Users\Admin\AppData\Local\Temp\is-D62Q9.tmp\Virtyu Ghost Client - Linkvertise Downloader_A2x-SC1.tmp

      Filesize

      3.4MB

      MD5

      5e99bb58ef7c6511011212dcc2d7c54e

      SHA1

      8903f713ce95672cb10d6a6052173a60f87a8073

      SHA256

      b4a2171728f8801e9de60ccece4d9c02796c0b43249868ec571b1fb16d18a929

      SHA512

      21f484df6b1141f23863a71548e49a6af4af32008a1ba4664965b5a05ad7e1d934bd9ec97f8d7968d966d779612919ecf4639edfe4fe38723a688d2de1285be2

    • \Users\Admin\AppData\Local\Temp\is-DLBSR.tmp\AppUtils.dll

      Filesize

      1.8MB

      MD5

      43ce6d593abd5141a3139603f352ae05

      SHA1

      a97c75e23d275dddfde15ef5fdf3ff3253c0992c

      SHA256

      94e874f2702ea6be50e7d74864b66e7f763449c3db237803f3fad6adfd64ed3d

      SHA512

      bfc527529e5f73ba190dfc5bd043175c7e2ae963b665d6d39421c29e025020f1d593dc88b7bee33d86ef6b4f7a4c5e1a0339df4e99cab6849a275d1dda9f439f

    • \Users\Admin\AppData\Local\Temp\is-DLBSR.tmp\DimensionUtils.dll

      Filesize

      1.9MB

      MD5

      ce2dc2cc12aec529511da19cf63ba802

      SHA1

      5b45c33a34df73920077f546176a3aa96df0f80e

      SHA256

      bde7cc0193ad2fbdfa9f072d9003bf1c82cd27e027b2e038343514f8cc8ee6d2

      SHA512

      98b5017e437b05639238b63bdf6cccdea7665f3fa0c55e87e8c7139551c213b1a63d641d588b950346ec66bb03b4800dc4e3dd4c60f80e0e76779b1ba58d2be7

    • \Users\Admin\AppData\Local\Temp\is-DLBSR.tmp\botva2.dll

      Filesize

      37KB

      MD5

      67965a5957a61867d661f05ae1f4773e

      SHA1

      f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

      SHA256

      450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

      SHA512

      c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

    • memory/820-61-0x0000000000400000-0x000000000053B000-memory.dmp

      Filesize

      1.2MB

    • memory/820-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

      Filesize

      8KB

    • memory/820-67-0x0000000000400000-0x000000000053B000-memory.dmp

      Filesize

      1.2MB

    • memory/820-55-0x0000000000400000-0x000000000053B000-memory.dmp

      Filesize

      1.2MB

    • memory/944-66-0x0000000074211000-0x0000000074213000-memory.dmp

      Filesize

      8KB

    • memory/944-64-0x0000000007760000-0x000000000776F000-memory.dmp

      Filesize

      60KB

    • memory/2040-72-0x000007FEFC211000-0x000007FEFC213000-memory.dmp

      Filesize

      8KB