Analysis

  • max time kernel
    63s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2023 18:22

General

  • Target

    d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe

  • Size

    3.2MB

  • MD5

    1a6d25867ba0a964b17d5de42b089a08

  • SHA1

    b49bd39ece3e9ef7406033b71e9264b96368fafb

  • SHA256

    d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e

  • SHA512

    c8c9e6bad2eefd541ea0f2ca107f3cf038bd26934740d7dab34503185aae685a5b8a850c57faaa82600e1f0cca47d583d7a52c85a00d45662ae490cdddd3e457

  • SSDEEP

    98304:7YlToliya34y41MiJdhQbkjGYVnJvGNyQr8HzvN:0lTvKy4+8hFFVnRkNr8HzvN

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 12 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with WMI 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe
    "C:\Users\Admin\AppData\Local\Temp\d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\SysWOW64\vrvctl.ocx"
      2⤵
        PID:2292
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c sc start vrvwatchserver
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\SysWOW64\sc.exe
          sc start vrvwatchserver
          3⤵
          • Launches sc.exe
          PID:176
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c wmic process where "name='watchclient.exe' " call Terminate & wmic process where "name='vrvsafec.exe' " call Terminate & wmic process where "name='vrvsafec64.exe' " call Terminate & wmic process where "name='edpvistadlg.exe' " call Terminate & wmic process where "name='vrvedp_m.exe' " call Terminate & wmic process where "name='vrvrf_c.exe' " call Terminate & wmic process where "name='vrvrf_c64.exe' " call Terminate & wmic process where "name='edptrayicon.exe' " call Terminate & wmic process where "name='DLPTray.exe' " call Terminate & wmic process where "name='EdpXcltSkin.exe' " call Terminate exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:224
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='watchclient.exe' " call Terminate
          3⤵
          • Kills process with WMI
          • Suspicious use of AdjustPrivilegeToken
          PID:3432
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvsafec.exe' " call Terminate
          3⤵
          • Kills process with WMI
          • Suspicious use of AdjustPrivilegeToken
          PID:3484
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvsafec64.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:1492
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='edpvistadlg.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:1096
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvedp_m.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:480
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvrf_c.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:4724
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='vrvrf_c64.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:3740
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='edptrayicon.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:692
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='DLPTray.exe' " call Terminate
          3⤵
          • Kills process with WMI
          PID:4712
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic process where "name='EdpXcltSkin.exe' " call Terminate exit
          3⤵
          • Kills process with WMI
          PID:2708
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c sc start vrvwatchserver
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Windows\SysWOW64\sc.exe
          sc start vrvwatchserver
          3⤵
          • Launches sc.exe
          PID:1888

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/176-134-0x0000000000000000-mapping.dmp

    • memory/224-135-0x0000000000000000-mapping.dmp

    • memory/480-140-0x0000000000000000-mapping.dmp

    • memory/692-143-0x0000000000000000-mapping.dmp

    • memory/1096-139-0x0000000000000000-mapping.dmp

    • memory/1492-138-0x0000000000000000-mapping.dmp

    • memory/1888-147-0x0000000000000000-mapping.dmp

    • memory/2292-132-0x0000000000000000-mapping.dmp

    • memory/2708-145-0x0000000000000000-mapping.dmp

    • memory/3312-146-0x0000000000000000-mapping.dmp

    • memory/3432-136-0x0000000000000000-mapping.dmp

    • memory/3484-137-0x0000000000000000-mapping.dmp

    • memory/3740-142-0x0000000000000000-mapping.dmp

    • memory/4712-144-0x0000000000000000-mapping.dmp

    • memory/4724-141-0x0000000000000000-mapping.dmp

    • memory/5084-133-0x0000000000000000-mapping.dmp