Analysis
-
max time kernel
298s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20-07-2023 03:37
Static task
static1
Behavioral task
behavioral1
Sample
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
Resource
win10-20230703-en
General
-
Target
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
-
Size
4.8MB
-
MD5
a5fa62f8cb515e6aafc529b34671c6a7
-
SHA1
09ba2232776cdb5c41349fd50a8ddf5883fbfb85
-
SHA256
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda
-
SHA512
0ecb161bab04660bbfcd75d01ea348a6abae3b12a5c1db42b0ee9a7a931cac1d6c931ea2db4a5dccdeb2dee39d9ba907b3e04df72b4dd79319ff818825140682
-
SSDEEP
12288:TeC3CZ/dn53l3lYZDGR2vK/BY3nLkpVpnG6kzv:i+m33l3lYZE2C/zG5
Malware Config
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
vcsdpii.exepid process 4372 vcsdpii.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run 728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe Set value (str) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe'\"" 728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe -
Drops file in Windows directory 1 IoCs
Processes:
728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exedescription ioc process File created C:\Windows\Tasks\idmuarbsowhxlemajbk.job 728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe"C:\Users\Admin\AppData\Local\Temp\728c034592a639712e51321596f4dd3c24da68fa649ffb334e12bfb48018ecda.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:2832
-
C:\Users\Admin\AppData\Local\Temp\vcsdpii.exeC:\Users\Admin\AppData\Local\Temp\vcsdpii.exe1⤵
- Executes dropped EXE
PID:4372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5d9f78b1385f35795a40b10a1011a1804
SHA1fc7d45d97c0a38e89348dfcb64dfcf9400a88be8
SHA25611b3386e84e32efedf037314dbf1f5e3378ff601695fb49adc71439aec576924
SHA512d091bfe76303454f118d690f7a681056a05ed62de1723aa497e4b3a87321960314aafade014e0ff9334683143bd6d8607a6e1949315cbbc884e17f36a005d436
-
Filesize
4.8MB
MD5d9f78b1385f35795a40b10a1011a1804
SHA1fc7d45d97c0a38e89348dfcb64dfcf9400a88be8
SHA25611b3386e84e32efedf037314dbf1f5e3378ff601695fb49adc71439aec576924
SHA512d091bfe76303454f118d690f7a681056a05ed62de1723aa497e4b3a87321960314aafade014e0ff9334683143bd6d8607a6e1949315cbbc884e17f36a005d436