Resubmissions
17-11-2023 17:23
231117-vydb3acg4v 1017-11-2023 17:09
231117-vpd71acf21 1017-11-2023 16:57
231117-vgd72abd46 1017-11-2023 15:58
231117-tej5tsaf38 3Analysis
-
max time kernel
722s -
max time network
657s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 17:23
Static task
static1
1 signatures
General
-
Target
VSP.dll
-
Size
1.2MB
-
MD5
1256db0d678a86a604a61dd42da07a4a
-
SHA1
5ba1f4e06963b726e6a127f2a4caf605c94991d6
-
SHA256
2bf21a583f86c4889b1653cb188aa361a20a9fbaa451d514c4d2d8bf5decc24d
-
SHA512
294a4777fdf76e2e72fa3e544c75967797a924038139a32b79b4456dbda45e15d4d063238a65b0256b9b9393267bfefe4967b54e6a93011a05846a96ed1fcff5
-
SSDEEP
24576:XDOgwgfYbK9s3kW3CG3vQ3snpR7loatbEUZqHwhv642THJ1r63LSw7b8VzkPPjwt:XDOyfYbK9sZvw8V/qQeHf6JUawknjY
Malware Config
Signatures
-
Detects PikaBot botnet 14 IoCs
resource yara_rule behavioral1/memory/3544-6-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-8-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-9-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-10-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-11-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-12-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-13-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-15-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-27-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-29-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-41-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-43-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-55-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 behavioral1/memory/3544-57-0x0000000000380000-0x00000000003CC000-memory.dmp family_pikabot_v2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 3544 4832 rundll32.exe 107 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2232 ipconfig.exe 3796 netstat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3544 SearchProtocolHost.exe 3544 SearchProtocolHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 4832 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 4700 whoami.exe Token: SeDebugPrivilege 3796 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3816 1232 rundll32.exe 88 PID 1232 wrote to memory of 3816 1232 rundll32.exe 88 PID 1232 wrote to memory of 3816 1232 rundll32.exe 88 PID 3728 wrote to memory of 3776 3728 cmd.exe 105 PID 3728 wrote to memory of 3776 3728 cmd.exe 105 PID 3776 wrote to memory of 4832 3776 rundll32.exe 106 PID 3776 wrote to memory of 4832 3776 rundll32.exe 106 PID 3776 wrote to memory of 4832 3776 rundll32.exe 106 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107 PID 4832 wrote to memory of 3544 4832 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VSP.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VSP.dll,#12⤵PID:3816
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\system32\rundll32.exerundll32 VSP.dll, Crash2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\rundll32.exerundll32 VSP.dll, Crash3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\SearchProtocolHost.exe"C:\Windows\System32\SearchProtocolHost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all5⤵
- Gathers network information
PID:2232
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1644