Analysis
-
max time kernel
82s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 20:29
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
409KB
-
MD5
24604438f2cb5fcbda87b9fe3f817bcb
-
SHA1
fe61f3c2824ea356df33eba858d5abed8f46ef82
-
SHA256
9a61e776585dc88a15e548278caead09cdb871d4f4fac962cf14f0d43eca9c25
-
SHA512
179fbb54aa9f3f87ff56c2521354a846d67115e691f2c9821dca92ed01b0492334ced528b33d3062d9a5575fa3ae0e1a12f2cf89150d380234af3921edcb7f9d
-
SSDEEP
6144:YtojTSy7+iRLF+NkKloo39+Te9Oy4BXZ/lZX02oNawWk/mrFy27UoZkCDqUFh:bSAM/99+Te9nWzZXcp/GF7UyDqUFh
Malware Config
Extracted
vidar
3
2548f166286a0b36dbfd9f8a1ac09311
https://t.me/zaskullz
https://steamcommunity.com/profiles/76561199486572327
http://135.181.87.234:80
-
profile_id_v2
2548f166286a0b36dbfd9f8a1ac09311
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1700 set thread context of 3728 1700 tmp.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1820 3728 WerFault.exe vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.exedescription pid process target process PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe PID 1700 wrote to memory of 3728 1700 tmp.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 3563⤵
- Program crash
PID:1820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3728 -ip 37281⤵PID:608