Analysis

  • max time kernel
    33s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2023 07:47

General

  • Target

    Vuodneyx.exe

  • Size

    664KB

  • MD5

    f07259a0cd92a6c0640ff1acd0d1a54d

  • SHA1

    270cc877c9b6571ec2b5c593dfba4f8ea4c5c966

  • SHA256

    cfd11acb2343bcc79e51f5c9db8443e901894d7580b430aecf8338a71cf624de

  • SHA512

    6d134f7121ebc3b4a53164c1be21b5428dad5c3dd24336398a9e07c933ca42387f498e93beeb61c9274683e497a781839a5b97404f14c3cfe1363e09b1116f28

  • SSDEEP

    12288:RCsgkm2i2+G9fQ17xbNQ2aD68JzLiZ0A7zM7AJ6c7M3aXf5DhPvZi:wsZM7bQ2ebhyPzMk4c7fv5Dh3

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vuodneyx.exe
    "C:\Users\Admin\AppData\Local\Temp\Vuodneyx.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2432
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
    1⤵
      PID:2904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2432-133-0x000001EEF7A80000-0x000001EEF7B2A000-memory.dmp

      Filesize

      680KB

    • memory/2432-134-0x00007FFE8AFF0000-0x00007FFE8BAB1000-memory.dmp

      Filesize

      10.8MB

    • memory/2432-135-0x000001EEF9720000-0x000001EEF9730000-memory.dmp

      Filesize

      64KB

    • memory/2432-136-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-137-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-139-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-141-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-143-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-145-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-147-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-149-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-151-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-153-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-155-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-157-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-159-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-161-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-163-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-165-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-167-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-169-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-171-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-173-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-175-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-177-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-179-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-181-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-183-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-185-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-187-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-189-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-191-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-193-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-195-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-197-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-199-0x000001EEFA030000-0x000001EEFA13C000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-735-0x00007FFE8AFF0000-0x00007FFE8BAB1000-memory.dmp

      Filesize

      10.8MB

    • memory/2432-919-0x000001EEF9720000-0x000001EEF9730000-memory.dmp

      Filesize

      64KB

    • memory/2432-3048-0x00007FFE8AFF0000-0x00007FFE8BAB1000-memory.dmp

      Filesize

      10.8MB