Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6b0d6dbf9d6a411d35b250595cff4b3f.exe
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
6b0d6dbf9d6a411d35b250595cff4b3f.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
6b0d6dbf9d6a411d35b250595cff4b3f.exe
-
Size
212KB
-
MD5
6b0d6dbf9d6a411d35b250595cff4b3f
-
SHA1
22e3dfe9ff7968f143237d90aeb6bf51de0ecc59
-
SHA256
e5c92201b021ea0cde8a889902f2404c100a903a862be17e7a387d331446f83f
-
SHA512
64a3072be6c8203b6f031c738c50d0b21ca8323ac444fa0907bf7fbb3bae7cec8f50b7b5a03b23047eee4638d6a9de91c99738611e88db57da7f079944105732
-
SSDEEP
6144:iDpla3f0AQ2Zm63AEGLozFsKxrxiHMTYTzxxjXPfp:iDplahvMLozFJ0FX
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 rvgfeov.exe -
Loads dropped DLL 4 IoCs
pid Process 2744 cmd.exe 2744 cmd.exe 2824 rvgfeov.exe 2824 rvgfeov.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2244 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 rvgfeov.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2824 rvgfeov.exe 2824 rvgfeov.exe 2824 rvgfeov.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2824 rvgfeov.exe 2824 rvgfeov.exe 2824 rvgfeov.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2744 2484 6b0d6dbf9d6a411d35b250595cff4b3f.exe 30 PID 2484 wrote to memory of 2744 2484 6b0d6dbf9d6a411d35b250595cff4b3f.exe 30 PID 2484 wrote to memory of 2744 2484 6b0d6dbf9d6a411d35b250595cff4b3f.exe 30 PID 2484 wrote to memory of 2744 2484 6b0d6dbf9d6a411d35b250595cff4b3f.exe 30 PID 2744 wrote to memory of 2244 2744 cmd.exe 28 PID 2744 wrote to memory of 2244 2744 cmd.exe 28 PID 2744 wrote to memory of 2244 2744 cmd.exe 28 PID 2744 wrote to memory of 2244 2744 cmd.exe 28 PID 2744 wrote to memory of 2664 2744 cmd.exe 32 PID 2744 wrote to memory of 2664 2744 cmd.exe 32 PID 2744 wrote to memory of 2664 2744 cmd.exe 32 PID 2744 wrote to memory of 2664 2744 cmd.exe 32 PID 2744 wrote to memory of 2824 2744 cmd.exe 33 PID 2744 wrote to memory of 2824 2744 cmd.exe 33 PID 2744 wrote to memory of 2824 2744 cmd.exe 33 PID 2744 wrote to memory of 2824 2744 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0d6dbf9d6a411d35b250595cff4b3f.exe"C:\Users\Admin\AppData\Local\Temp\6b0d6dbf9d6a411d35b250595cff4b3f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2484 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6b0d6dbf9d6a411d35b250595cff4b3f.exe" & start C:\Users\Admin\AppData\Local\rvgfeov.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2664
-
-
C:\Users\Admin\AppData\Local\rvgfeov.exeC:\Users\Admin\AppData\Local\rvgfeov.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 24841⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244