Analysis
-
max time kernel
188s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
11/11/2023, 22:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VX_BOT.exe
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
VX_BOT.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
VX_BOT.exe
-
Size
3.1MB
-
MD5
9e27cb40b90706353a05e19b384eaa49
-
SHA1
9f5dae9122be5bc7119c09b12e11a063c0b7ac97
-
SHA256
c1cd856251bcec6054cf1b927dc4f9cf98b1999fbd6084816ef9a5e15834ea76
-
SHA512
3d241a33d8cf8b80723cb3fe845f3dedd78ebffc0f827e91d57992a774a266c01db414c94965d428821d129fa05c3c3003adef302c0fc5917353094cc266a52d
-
SSDEEP
98304:6d3CKSzymbvaMDsY34Uwi38Qt41rk41Rsg:6odmm7lh4U738QKzW
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe 2660 VX_BOT.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1720 2660 VX_BOT.exe 32 PID 2660 wrote to memory of 1720 2660 VX_BOT.exe 32 PID 2660 wrote to memory of 1720 2660 VX_BOT.exe 32 PID 1720 wrote to memory of 2664 1720 cmd.exe 31 PID 1720 wrote to memory of 2664 1720 cmd.exe 31 PID 1720 wrote to memory of 2664 1720 cmd.exe 31 PID 1720 wrote to memory of 2692 1720 cmd.exe 30 PID 1720 wrote to memory of 2692 1720 cmd.exe 30 PID 1720 wrote to memory of 2692 1720 cmd.exe 30 PID 1720 wrote to memory of 2700 1720 cmd.exe 33 PID 1720 wrote to memory of 2700 1720 cmd.exe 33 PID 1720 wrote to memory of 2700 1720 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe"C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2700
-
-
-
C:\Windows\system32\find.exefind /i /v "md5"1⤵PID:2692
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe" MD51⤵PID:2664