Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:21
Static task
static1
Behavioral task
behavioral1
Sample
vrz9hacoe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
vrz9hacoe.exe
Resource
win10v2004-20231222-en
General
-
Target
vrz9hacoe.exe
-
Size
72KB
-
MD5
7be69929b9bc407cfb09f140b288c6c5
-
SHA1
e4620d3828ebd8f588caf0652cdaef0b09b231d8
-
SHA256
23a8378699f5bb925b32c7124f62468886bf3ce39a9feec1857a446de55f36ce
-
SHA512
1209ee4b19043b02e94728635b60a84f47542a6c0ae18f8fa0d76a20e3726d2f0ccde50a8dec7fba1398cf836543097621e7700089d9b72edb38ee0253818161
-
SSDEEP
768:zYnI9ZvPg2k4u+hJDdv260OAhAH4Ii7gLp6uqcl2aauA:zwIrHuCtd3FAhAYIi7Glba
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 29dk54n4c.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 vrz9hacoe.exe 2236 vrz9hacoe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\bxvxkei6 = "C:\\Users\\Admin\\AppData\\Roaming\\29dk54n4c.exe" vrz9hacoe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2340 2236 vrz9hacoe.exe 24 PID 2236 wrote to memory of 2340 2236 vrz9hacoe.exe 24 PID 2236 wrote to memory of 2340 2236 vrz9hacoe.exe 24 PID 2236 wrote to memory of 2340 2236 vrz9hacoe.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe"C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\29dk54n4c.exeC:\Users\Admin\AppData\Roaming\29dk54n4c.exe2⤵
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56738a4c55b8be6825517717db7aaa36f
SHA19d380d42c57de287d2f206767ec878187dafa1e5
SHA256b1a1bdb0862d456c0981d8885298c866ad42bae198e043730f20dc4bdd0a294e
SHA51240390d78cd97bdd54d564cd89daf539cfc8a66bc5a73aea83d876afd36dfd6e378b90422f086207fddd1b1c11fe9b2c289e3d29305ab71c412b06440dff2e6fe