Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
00ee85377095b427c1f1a79867b10120.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00ee85377095b427c1f1a79867b10120.exe
Resource
win10v2004-20231215-en
General
-
Target
00ee85377095b427c1f1a79867b10120.exe
-
Size
19KB
-
MD5
00ee85377095b427c1f1a79867b10120
-
SHA1
1ffa7166c96acece18d17ffdc4eb31b0b94a362d
-
SHA256
7ba07c7a9af3d5f677c11492060c9a78bc9bea2c0df1ae70f9eb597e15512d9c
-
SHA512
26f89fc713c1f18ea568713969dbedc56d8063f7d402c1a7a3fffb021c45b78c45846e074fc828d21dd6ca592895e229a72a9b2b4f265209b3b85faaed7a90a5
-
SSDEEP
384:/CptGOufX+Sa0G5JvQEVfIxL5mXeQPtplmx2yDQFhORbH:/stUX9mvZtyQVplE20QFC
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2100 VBurl.exe 2024 VBurl.exe 2156 VBurl.exe 2676 VBurl.exe -
Loads dropped DLL 8 IoCs
pid Process 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe 2980 00ee85377095b427c1f1a79867b10120.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main VBurl.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main VBurl.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main VBurl.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main VBurl.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2100 VBurl.exe 2100 VBurl.exe 2100 VBurl.exe 2024 VBurl.exe 2024 VBurl.exe 2024 VBurl.exe 2156 VBurl.exe 2156 VBurl.exe 2156 VBurl.exe 2676 VBurl.exe 2676 VBurl.exe 2676 VBurl.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2100 2980 00ee85377095b427c1f1a79867b10120.exe 28 PID 2980 wrote to memory of 2100 2980 00ee85377095b427c1f1a79867b10120.exe 28 PID 2980 wrote to memory of 2100 2980 00ee85377095b427c1f1a79867b10120.exe 28 PID 2980 wrote to memory of 2100 2980 00ee85377095b427c1f1a79867b10120.exe 28 PID 2980 wrote to memory of 2024 2980 00ee85377095b427c1f1a79867b10120.exe 33 PID 2980 wrote to memory of 2024 2980 00ee85377095b427c1f1a79867b10120.exe 33 PID 2980 wrote to memory of 2024 2980 00ee85377095b427c1f1a79867b10120.exe 33 PID 2980 wrote to memory of 2024 2980 00ee85377095b427c1f1a79867b10120.exe 33 PID 2980 wrote to memory of 2156 2980 00ee85377095b427c1f1a79867b10120.exe 35 PID 2980 wrote to memory of 2156 2980 00ee85377095b427c1f1a79867b10120.exe 35 PID 2980 wrote to memory of 2156 2980 00ee85377095b427c1f1a79867b10120.exe 35 PID 2980 wrote to memory of 2156 2980 00ee85377095b427c1f1a79867b10120.exe 35 PID 2980 wrote to memory of 2676 2980 00ee85377095b427c1f1a79867b10120.exe 37 PID 2980 wrote to memory of 2676 2980 00ee85377095b427c1f1a79867b10120.exe 37 PID 2980 wrote to memory of 2676 2980 00ee85377095b427c1f1a79867b10120.exe 37 PID 2980 wrote to memory of 2676 2980 00ee85377095b427c1f1a79867b10120.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ee85377095b427c1f1a79867b10120.exe"C:\Users\Admin\AppData\Local\Temp\00ee85377095b427c1f1a79867b10120.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\VBurl.exeC:\Users\Admin\AppData\Local\Temp\VBurl.exe http://soft.32881.com2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\VBurl.exeC:\Users\Admin\AppData\Local\Temp\VBurl.exe http://www.gggfff.net2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\VBurl.exeC:\Users\Admin\AppData\Local\Temp\VBurl.exe http://www.besthtm.cn2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\VBurl.exeC:\Users\Admin\AppData\Local\Temp\VBurl.exe http://down.32881.com2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e0cff66963087d188bbed29b64c7de0f
SHA186528ef155959c845542f4aeeb23f52b151708ca
SHA256f2e7a1f8f092783e97b4265480856a045d35cd9ecccb928e8021667d4472a3a1
SHA512b0d2cba934672451e1c914485a805b75c95f0a2039aaafa94963fa9b444dafebd16e30db99f086a6f02ee59ba2c6b4843d61fc8b6f09da922b9d965613c17827