Analysis

  • max time kernel
    146s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 18:50

General

  • Target

    00ee85377095b427c1f1a79867b10120.exe

  • Size

    19KB

  • MD5

    00ee85377095b427c1f1a79867b10120

  • SHA1

    1ffa7166c96acece18d17ffdc4eb31b0b94a362d

  • SHA256

    7ba07c7a9af3d5f677c11492060c9a78bc9bea2c0df1ae70f9eb597e15512d9c

  • SHA512

    26f89fc713c1f18ea568713969dbedc56d8063f7d402c1a7a3fffb021c45b78c45846e074fc828d21dd6ca592895e229a72a9b2b4f265209b3b85faaed7a90a5

  • SSDEEP

    384:/CptGOufX+Sa0G5JvQEVfIxL5mXeQPtplmx2yDQFhORbH:/stUX9mvZtyQVplE20QFC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ee85377095b427c1f1a79867b10120.exe
    "C:\Users\Admin\AppData\Local\Temp\00ee85377095b427c1f1a79867b10120.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\VBurl.exe
      C:\Users\Admin\AppData\Local\Temp\VBurl.exe http://soft.32881.com
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2100
    • C:\Users\Admin\AppData\Local\Temp\VBurl.exe
      C:\Users\Admin\AppData\Local\Temp\VBurl.exe http://www.gggfff.net
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2024
    • C:\Users\Admin\AppData\Local\Temp\VBurl.exe
      C:\Users\Admin\AppData\Local\Temp\VBurl.exe http://www.besthtm.cn
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2156
    • C:\Users\Admin\AppData\Local\Temp\VBurl.exe
      C:\Users\Admin\AppData\Local\Temp\VBurl.exe http://down.32881.com
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\VBurl.exe

    Filesize

    8KB

    MD5

    e0cff66963087d188bbed29b64c7de0f

    SHA1

    86528ef155959c845542f4aeeb23f52b151708ca

    SHA256

    f2e7a1f8f092783e97b4265480856a045d35cd9ecccb928e8021667d4472a3a1

    SHA512

    b0d2cba934672451e1c914485a805b75c95f0a2039aaafa94963fa9b444dafebd16e30db99f086a6f02ee59ba2c6b4843d61fc8b6f09da922b9d965613c17827

  • memory/2024-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2024-67-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2024-66-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2024-75-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2024-37-0x0000000004820000-0x0000000004B67000-memory.dmp

    Filesize

    3.3MB

  • memory/2024-31-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2100-64-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2100-18-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2100-12-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2100-36-0x00000000049C0000-0x0000000004D07000-memory.dmp

    Filesize

    3.3MB

  • memory/2156-71-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2156-98-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2156-96-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2156-105-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2156-72-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2156-76-0x0000000004390000-0x00000000053F2000-memory.dmp

    Filesize

    16.4MB

  • memory/2676-104-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2676-110-0x00000000048E0000-0x0000000004C27000-memory.dmp

    Filesize

    3.3MB

  • memory/2676-109-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2676-108-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2980-65-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2980-26-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-97-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-27-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-17-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-16-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-107-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-11-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-10-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/2980-2-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB