Resubmissions

01-07-2023 13:13

230701-qgk85agh26 5

01-07-2023 13:11

230701-qfcwcsaa6y 3

Analysis

  • max time kernel
    102s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2023 13:13

General

  • Target

    VengefulThief.exe

  • Size

    46.9MB

  • MD5

    8ca39d3a95d589fec59cf526d294aed7

  • SHA1

    bd07ff6f02a4cd5a28312f2af2eee61b281018e3

  • SHA256

    ad3f75f14da732dd09ec8e391cced6c7657fa309863e440f8d68d34e22750017

  • SHA512

    1718df8ed0956bb82e84ef9168c4a514b82cfe09bcffb2f8c212d43f4bf26b1f6606aa7113f1e5a016dcbe2223bc1d715b47c60c580b94955cda6098b7050d84

  • SSDEEP

    786432:htakRWH1pL1gJqrYW1zC8MQFHx6IVswnbOo522U4AqE:hQkQPpaMpC8MQOnl12vAqE

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VengefulThief.exe
    "C:\Users\Admin\AppData\Local\Temp\VengefulThief.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:4936
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pb2ruk1f\pb2ruk1f.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3856
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF8FB.tmp" "c:\Users\Admin\AppData\Local\Temp\pb2ruk1f\CSCC3898828B45442329F5EB8B8DF837774.TMP"
            4⤵
              PID:4160
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2132
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3568
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1392
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
          2⤵
            PID:1192
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4940
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:336
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2516
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2256
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:3332
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1284
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4580
              • C:\Windows\System32\reg.exe
                C:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
                3⤵
                  PID:4324
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"
                2⤵
                  PID:4004
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k netsvcs -p
                1⤵
                • Drops file in System32 directory
                PID:4128
              • C:\Windows\system32\taskmgr.exe
                "C:\Windows\system32\taskmgr.exe" /4
                1⤵
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:3640

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                2f57fde6b33e89a63cf0dfdd6e60a351

                SHA1

                445bf1b07223a04f8a159581a3d37d630273010f

                SHA256

                3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                SHA512

                42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                2f87410b0d834a14ceff69e18946d066

                SHA1

                f2ec80550202d493db61806693439a57b76634f3

                SHA256

                5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                SHA512

                a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                98a793e2ac3296e30c3acde8ea165b86

                SHA1

                5a8c24532c628938707ac50298cda27a68f820d1

                SHA256

                0a9a794b94b7cedf962e0122641e4386522e2e6c7f33fd9dbab7e896d2ac7dcb

                SHA512

                5103fb3e43f9d0a65c1dedbbf416ee25271ce21fdd118f5729f73dae663bc945df3a0f258f1ed5fc1988cc249ca8acfb488fca878f02037c0b2234106cd01ed6

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                1aa8113faa6606302cc3cefaaa283253

                SHA1

                238e779fe53366bb95e5ce41bd4c7f55628e6209

                SHA256

                0bcdee7a81619894a44448d5dc757567aa44a5c4e4ec0024307dfed46d1667ff

                SHA512

                fcd8af727f641b7f39c8ec240f211ffcda248590ca4fdb4267535d019fc6ed811623d85d36226a7acbcf3ad009fffce28ce27da3fbc3f2b7232a35fed9b7c038

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                26c92e11c7c329ccc22a888715e9a235

                SHA1

                511926cf5a36e03ccd1b82eeeb88a507f04475e2

                SHA256

                27cf4fc94501fe224c8807eb7887f0ad7eb9c3c0bc081cd535217848452308d7

                SHA512

                ee281bbf46642b33d9fee4b04b30632d528658f93d9f828645994acb81cf67ba578243e1ecfda40a67fb45a949be4c0bb951a97f5caad60d43a75b28392eda8e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                26c92e11c7c329ccc22a888715e9a235

                SHA1

                511926cf5a36e03ccd1b82eeeb88a507f04475e2

                SHA256

                27cf4fc94501fe224c8807eb7887f0ad7eb9c3c0bc081cd535217848452308d7

                SHA512

                ee281bbf46642b33d9fee4b04b30632d528658f93d9f828645994acb81cf67ba578243e1ecfda40a67fb45a949be4c0bb951a97f5caad60d43a75b28392eda8e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                26c92e11c7c329ccc22a888715e9a235

                SHA1

                511926cf5a36e03ccd1b82eeeb88a507f04475e2

                SHA256

                27cf4fc94501fe224c8807eb7887f0ad7eb9c3c0bc081cd535217848452308d7

                SHA512

                ee281bbf46642b33d9fee4b04b30632d528658f93d9f828645994acb81cf67ba578243e1ecfda40a67fb45a949be4c0bb951a97f5caad60d43a75b28392eda8e

              • C:\Users\Admin\AppData\Local\Temp\RESF8FB.tmp

                Filesize

                1KB

                MD5

                a3d86fb2073bd255b137735ccf8b2bd2

                SHA1

                25a2195c6e7978cf8ea2c18ad228621a992058ac

                SHA256

                975cb4462d7b0ba566d2df8cc246e4f92f9a72cf8eb04bf5ba4d5d7d80c75d46

                SHA512

                13836ce00ed160eb2b3eedd0433b7ad6a86116cd2b162fcd7b9c72d6fc0abbb2eaf96c0e37b8a8f57473a817f9e9bf170381af02585502a2a475cd500e238991

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yvrtmtlv.mzj.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\pb2ruk1f\pb2ruk1f.dll

                Filesize

                3KB

                MD5

                62a32542880c72dae8338413e881c6de

                SHA1

                2e9f97c5f0643b6dadc71c891796a32f753d8f04

                SHA256

                02578220624382015cde4150b920269bfcaba2e5bc6c0de1638afcf7718b9ef4

                SHA512

                016c949967b9d9b7f6822304decc7f31257b04c74b6964ad8478d4a11ad0628f5d048829e432e2f4060e1aa3d52d8b1b4228e528a38d5d3347b7ca7a662cb3e9

              • \??\c:\Users\Admin\AppData\Local\Temp\pb2ruk1f\CSCC3898828B45442329F5EB8B8DF837774.TMP

                Filesize

                652B

                MD5

                bc9bf2190401bc452e7f2f6010a053c0

                SHA1

                b5cbe7b6338da14fab3defafde692c9af26d3d2c

                SHA256

                64f29ea881992fac96e006a467ca82eacc6f6131d953e8fd08b41789c5a4851e

                SHA512

                b2c5ffd6e91285181a1b52347a0287fe086a444b0cfd7eca7ac62dcc72d59b0cfe165e2b3ca82e8f5c50f734b953cb323e9e615d1090ec7a417564937e3c6dd4

              • \??\c:\Users\Admin\AppData\Local\Temp\pb2ruk1f\pb2ruk1f.0.cs

                Filesize

                312B

                MD5

                ecbf151f81ff98f7dff196304a40239e

                SHA1

                ccf6b97b6f8276656b042d64f0595963fe9ec79c

                SHA256

                295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8

                SHA512

                4526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720

              • \??\c:\Users\Admin\AppData\Local\Temp\pb2ruk1f\pb2ruk1f.cmdline

                Filesize

                369B

                MD5

                b982864009f20e7bfd8424746c53028e

                SHA1

                62aab5804b99a6ddc0822a387db34d1b7ec6aeee

                SHA256

                d03ff8d1e21df385df24c1aca283b5845d80a7cce66f21949bf42270496d17d6

                SHA512

                90c216968199da836e61a7ded145c954377ebdb1c528904b199d15a235978125a7802a6f35828086435d93091e6128275681650294f80766c5a804d13b3f3372

              • memory/2132-187-0x0000024EC5870000-0x0000024EC5A8C000-memory.dmp

                Filesize

                2.1MB

              • memory/2132-163-0x0000024EC5830000-0x0000024EC5840000-memory.dmp

                Filesize

                64KB

              • memory/2132-182-0x0000024EC5FC0000-0x0000024EC5FEA000-memory.dmp

                Filesize

                168KB

              • memory/2132-183-0x0000024EC5FC0000-0x0000024EC5FE4000-memory.dmp

                Filesize

                144KB

              • memory/2132-156-0x0000024EC5F70000-0x0000024EC5FB4000-memory.dmp

                Filesize

                272KB

              • memory/2132-159-0x0000024EC6040000-0x0000024EC60B6000-memory.dmp

                Filesize

                472KB

              • memory/2132-166-0x0000024EC5830000-0x0000024EC5840000-memory.dmp

                Filesize

                64KB

              • memory/2132-142-0x0000024EC5840000-0x0000024EC5862000-memory.dmp

                Filesize

                136KB

              • memory/2132-167-0x0000024EC5830000-0x0000024EC5840000-memory.dmp

                Filesize

                64KB

              • memory/2516-241-0x00000212A8160000-0x00000212A8170000-memory.dmp

                Filesize

                64KB

              • memory/2516-235-0x00000212A8160000-0x00000212A8170000-memory.dmp

                Filesize

                64KB

              • memory/3268-168-0x000002D66DAF0000-0x000002D66DB00000-memory.dmp

                Filesize

                64KB

              • memory/3268-179-0x000002D66DB00000-0x000002D66DD1C000-memory.dmp

                Filesize

                2.1MB

              • memory/3268-171-0x000002D66DAF0000-0x000002D66DB00000-memory.dmp

                Filesize

                64KB

              • memory/3568-200-0x00000277996E0000-0x00000277996F0000-memory.dmp

                Filesize

                64KB

              • memory/3568-201-0x00000277996E0000-0x00000277996F0000-memory.dmp

                Filesize

                64KB

              • memory/3568-202-0x00000277996E0000-0x00000277996F0000-memory.dmp

                Filesize

                64KB

              • memory/3640-294-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-292-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-293-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-298-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-299-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-300-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-301-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-302-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-303-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/3640-304-0x0000020FB2CB0000-0x0000020FB2CB1000-memory.dmp

                Filesize

                4KB

              • memory/4940-264-0x000002187E620000-0x000002187E630000-memory.dmp

                Filesize

                64KB

              • memory/4940-236-0x000002187E620000-0x000002187E630000-memory.dmp

                Filesize

                64KB