Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 22:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VX_BOT.exe
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
VX_BOT.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
VX_BOT.exe
-
Size
3.1MB
-
MD5
9e27cb40b90706353a05e19b384eaa49
-
SHA1
9f5dae9122be5bc7119c09b12e11a063c0b7ac97
-
SHA256
c1cd856251bcec6054cf1b927dc4f9cf98b1999fbd6084816ef9a5e15834ea76
-
SHA512
3d241a33d8cf8b80723cb3fe845f3dedd78ebffc0f827e91d57992a774a266c01db414c94965d428821d129fa05c3c3003adef302c0fc5917353094cc266a52d
-
SSDEEP
98304:6d3CKSzymbvaMDsY34Uwi38Qt41rk41Rsg:6odmm7lh4U738QKzW
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe 3204 VX_BOT.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1848 3204 VX_BOT.exe 88 PID 3204 wrote to memory of 1848 3204 VX_BOT.exe 88 PID 1848 wrote to memory of 1844 1848 cmd.exe 89 PID 1848 wrote to memory of 1844 1848 cmd.exe 89 PID 1848 wrote to memory of 4196 1848 cmd.exe 90 PID 1848 wrote to memory of 4196 1848 cmd.exe 90 PID 1848 wrote to memory of 3308 1848 cmd.exe 91 PID 1848 wrote to memory of 3308 1848 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe"C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VX_BOT.exe" MD53⤵PID:1844
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4196
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3308
-
-