Analysis
-
max time kernel
6s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
61fd3b65043c02d19fe62f17bdfcc697.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
61fd3b65043c02d19fe62f17bdfcc697.exe
Resource
win10v2004-20231222-en
General
-
Target
61fd3b65043c02d19fe62f17bdfcc697.exe
-
Size
116KB
-
MD5
61fd3b65043c02d19fe62f17bdfcc697
-
SHA1
d1c35c62b0d23c9132055224f2a98cfc89ee4948
-
SHA256
ddb26bc461afcf39ef0ffebb23e33ff4313382610989c5f744a7b810513ba940
-
SHA512
1f1a24ae81dce8d9b083691164b663fa0115c8c6379169ffa8e4dfa0d89333d5454225451ad0dd265c1b486258518fb966e8ed76da4145840b6fcfcc6c2a3c82
-
SSDEEP
3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5H/U:SZRcx5VMpOKXur2Qf+5H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1008 Vpekua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vpekua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vpekua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 61fd3b65043c02d19fe62f17bdfcc697.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 61fd3b65043c02d19fe62f17bdfcc697.exe File created C:\Windows\Vpekua.exe 61fd3b65043c02d19fe62f17bdfcc697.exe File opened for modification C:\Windows\Vpekua.exe 61fd3b65043c02d19fe62f17bdfcc697.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main Vpekua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1008 3068 61fd3b65043c02d19fe62f17bdfcc697.exe 90 PID 3068 wrote to memory of 1008 3068 61fd3b65043c02d19fe62f17bdfcc697.exe 90 PID 3068 wrote to memory of 1008 3068 61fd3b65043c02d19fe62f17bdfcc697.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\61fd3b65043c02d19fe62f17bdfcc697.exe"C:\Users\Admin\AppData\Local\Temp\61fd3b65043c02d19fe62f17bdfcc697.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Vpekua.exeC:\Windows\Vpekua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
PID:1008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
362B
MD5a7aac1e1e7e43d48b5e2aa2b198bd125
SHA1f133ee5daafea99b1dfc2f073dd4d5fc73255dd6
SHA2563b29d36f454857374b34a0203d35e4a35f65fb0f6ea49c91915480721191c017
SHA51210c24b0a67831c8ccd5584a27768430dae7e684a8e5a5f0f69b4895eb1aacab0e0c6db0e6d9c40a333ba3514972e40aef8da41eb29b3d85eca027c30245f0369
-
Filesize
13KB
MD5ec3164e54e6a43f7f32de99a3ea718b4
SHA180acb076d598489e1093aca2c46b0bf6e6711cc0
SHA25649e9415784afb702b0f541149b6f40193a5ea5055c1ca1c27f3a884374f7a232
SHA512b664fe7629b94719a84b508d2b402ff1f3c57e9d91f4b2209b3a5e50a47ef3710ed416baeb3f255df1b205f4212a22bc3adffd618e0e3dd6ad194537456ac29f
-
Filesize
5KB
MD56efe55d4f4a8947e728fb4ede9893899
SHA1b171f32498590684581953fdb666a84726039ea3
SHA256acd64d8f34169d72f23895bfccd011494e5753a3a79a506155e43be403f0b873
SHA5120e4ac8185b9e3236c4f504512bb3392da4eda0ea5b3deb33cdbaa5fc6df601b4d7fecfc9384e335891290c891ee20362a473da721d4a459c27087e0dda8abfb5