Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25-08-2023 01:45
Static task
static1
Behavioral task
behavioral1
Sample
59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe
Resource
win10v2004-20230703-en
General
-
Target
59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe
-
Size
14.0MB
-
MD5
a71609fea0887e5261e10f323719ed19
-
SHA1
405e439c837a15ca67d8ccf7a810ffb097173af4
-
SHA256
59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff
-
SHA512
2f75a1ce40e63dfdd7612501795a017bd98362f87b43ffabc142b9e3ad99f159ff97fbf3cf63e204fbd7a2c83d5e4fcb6eb06df92ed266562051fa2d22359c61
-
SSDEEP
12288:Csxmdj2NtdggxR2FCLDNToj5taAtw6J4lmEDHJy1XiIopXQXZnOa33w6HVtIuClJ:HdhxR2FiNToj5IAH+y2a33w6EbjvxVC
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exedescription pid Process procid_target PID 2248 set thread context of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid Process 2200 vbc.exe 2200 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid Process Token: SeDebugPrivilege 2200 vbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exedescription pid Process procid_target PID 2248 wrote to memory of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28 PID 2248 wrote to memory of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28 PID 2248 wrote to memory of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28 PID 2248 wrote to memory of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28 PID 2248 wrote to memory of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28 PID 2248 wrote to memory of 2200 2248 59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe"C:\Users\Admin\AppData\Local\Temp\59bd3b30ff0e9c2d1d335cb7cd8d305fa047e79cd0873b1a02936d9d999a35ff.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-