Analysis
-
max time kernel
16s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 13:03
Static task
static1
Behavioral task
behavioral1
Sample
2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
-
Size
34KB
-
MD5
b28805a91c77bd56fb47307477c522f8
-
SHA1
2fffb9e3cef7f3b779884b4d690137c10b266b56
-
SHA256
aa4046ab8b9a2566c1a35d827ed97ce8f15e0254727d270807505f47d53aaeff
-
SHA512
c2b602132cd28cdae70d9e03609b23d27f90eb094857caeb0740b56196ae28bbd9982f864f81e145b362a4fea2379e18f21b3f94cd529363ea4a2a536eadad51
-
SSDEEP
384:kOhNuCCfNNrQKvPWXwEwZhI6hlhxggKWJUw34KljAAlGOBN3z7E7H96vEPnKvFU8:kOWNrrWXnohVxKWaihMbKW+k2RH
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 1540 828 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1724 wrote to memory of 656 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 27 PID 1724 wrote to memory of 656 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 27 PID 1724 wrote to memory of 656 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 27 PID 1724 wrote to memory of 472 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 28 PID 1724 wrote to memory of 472 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 28 PID 1724 wrote to memory of 472 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 28 PID 1724 wrote to memory of 1152 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 29 PID 1724 wrote to memory of 1152 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 29 PID 1724 wrote to memory of 1152 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 29 PID 1724 wrote to memory of 944 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 30 PID 1724 wrote to memory of 944 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 30 PID 1724 wrote to memory of 944 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 30 PID 1724 wrote to memory of 1144 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 31 PID 1724 wrote to memory of 1144 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 31 PID 1724 wrote to memory of 1144 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 31 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 1724 wrote to memory of 828 1724 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 32 PID 828 wrote to memory of 1540 828 SetupUtility.exe 33 PID 828 wrote to memory of 1540 828 SetupUtility.exe 33 PID 828 wrote to memory of 1540 828 SetupUtility.exe 33 PID 828 wrote to memory of 1540 828 SetupUtility.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fffb9e3cef7f3b779884b4d690137c10b266b56.exe"C:\Users\Admin\AppData\Local\Temp\2fffb9e3cef7f3b779884b4d690137c10b266b56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:1152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:944
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1144
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 1683⤵
- Program crash
PID:1540
-
-