Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
vrz9hacoe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
vrz9hacoe.exe
Resource
win10v2004-20231222-en
General
-
Target
vrz9hacoe.exe
-
Size
72KB
-
MD5
7be69929b9bc407cfb09f140b288c6c5
-
SHA1
e4620d3828ebd8f588caf0652cdaef0b09b231d8
-
SHA256
23a8378699f5bb925b32c7124f62468886bf3ce39a9feec1857a446de55f36ce
-
SHA512
1209ee4b19043b02e94728635b60a84f47542a6c0ae18f8fa0d76a20e3726d2f0ccde50a8dec7fba1398cf836543097621e7700089d9b72edb38ee0253818161
-
SSDEEP
768:zYnI9ZvPg2k4u+hJDdv260OAhAH4Ii7gLp6uqcl2aauA:zwIrHuCtd3FAhAYIi7Glba
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3896 tj27w.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\i1b822 = "C:\\Users\\Admin\\AppData\\Roaming\\tj27w.exe" vrz9hacoe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 3896 220 vrz9hacoe.exe 89 PID 220 wrote to memory of 3896 220 vrz9hacoe.exe 89 PID 220 wrote to memory of 3896 220 vrz9hacoe.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe"C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Roaming\tj27w.exeC:\Users\Admin\AppData\Roaming\tj27w.exe2⤵
- Executes dropped EXE
PID:3896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b18e0bd14a7c9d6e52aef4ca551f042c
SHA154f1cee4680285db8570e96a2f11c88524398fb5
SHA2560ab6f4c8a5ab34495936f44f2b97b473db78532494138680b413c537a94b7d4c
SHA5124a6a27543f30038eccd22a4fe2c62de4fb4a6fbeed356602f880017f1ec3f205b956ee11b9ef1a96559a3b75eb1c6cb06c8b2689efbdb667f2740609680754af