Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2023 15:23

General

  • Target

    some.exe

  • Size

    114KB

  • MD5

    73087e68a230fde5c9d76f9c13f585d2

  • SHA1

    14d0d852e6bc61df0a0880dc8dab21cfba7b1a89

  • SHA256

    d6e626a9d886d492459872d1e82a172ba0dc3cb788180c20c3d7fd5c02e4635a

  • SHA512

    c62adaa2b2f64b8abf0f24bd282a0ea88ee68bab434ecadb242dfa0ce066ae83df68e92938af77fe0a2ac4765d9091dfb6c268783a17d8523eb289d61f81f82d

  • SSDEEP

    3072:IJZKnPE2YyJzELtyTtyYeY8lNgoiJ+sX8HFvytbUNk:IJZKBI0tyYeY4eoiJ+sCFvj

Score
10/10

Malware Config

Signatures

  • VanillaRat

    VanillaRat is an advanced remote administration tool coded in C#.

  • Vanilla Rat payload 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\some.exe
    "C:\Users\Admin\AppData\Local\Temp\some.exe"
    1⤵
      PID:2296
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x5c8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2080
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:588

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/588-57-0x000007FEF5FD0000-0x000007FEF601C000-memory.dmp
      Filesize

      304KB

    • memory/588-58-0x00000000021B0000-0x00000000021B1000-memory.dmp
      Filesize

      4KB

    • memory/2296-54-0x00000000010A0000-0x00000000010C2000-memory.dmp
      Filesize

      136KB

    • memory/2296-55-0x0000000004D90000-0x0000000004DD0000-memory.dmp
      Filesize

      256KB

    • memory/2296-56-0x0000000004D90000-0x0000000004DD0000-memory.dmp
      Filesize

      256KB