Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:50
Behavioral task
behavioral1
Sample
20a130f06435c43f85976bfef5b29bde.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20a130f06435c43f85976bfef5b29bde.exe
Resource
win10v2004-20231215-en
General
-
Target
20a130f06435c43f85976bfef5b29bde.exe
-
Size
211KB
-
MD5
20a130f06435c43f85976bfef5b29bde
-
SHA1
59be39c9ceb02fcb7e82545ec30440e72de5c1a8
-
SHA256
85a2e7a7a02b001a4c0d2c2b7b5f500fcea39e1f59e66b018091f0fd28274ff8
-
SHA512
7638eb062ea9dd0ab9225e0715fdf00fced06d644ae8cf037043a9f89b4e1966907e972abf4316c426da57cb0a5a37d952b4c5682b908e0164c1c3c36d3febc2
-
SSDEEP
3072:f+xVnZQvvFzxmMTo9ml1h7S9vZVotNK3D0wJBu240qNPwpiMNyzwQeD:2Pn6vDVo0xooK3IwO240qNPL9UZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 cmd.exe -
resource yara_rule behavioral1/memory/2600-0-0x0000000000400000-0x000000000073E000-memory.dmp upx behavioral1/memory/2600-26-0x0000000000400000-0x000000000073E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vaccinecomstart.exe = "C:\\Program Files (x86)\\vaccinecom\\vaccinecomstart.exe" 20a130f06435c43f85976bfef5b29bde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vaccinecom main = "C:\\Program Files (x86)\\vaccinecom\\vaccinecomu.exe /8L" 20a130f06435c43f85976bfef5b29bde.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 20a130f06435c43f85976bfef5b29bde.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 20a130f06435c43f85976bfef5b29bde.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\rebornd1 = "259421956" 20a130f06435c43f85976bfef5b29bde.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\vaccinecom_pay = "1" 20a130f06435c43f85976bfef5b29bde.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 20a130f06435c43f85976bfef5b29bde.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2600 20a130f06435c43f85976bfef5b29bde.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2600 20a130f06435c43f85976bfef5b29bde.exe 2600 20a130f06435c43f85976bfef5b29bde.exe 2600 20a130f06435c43f85976bfef5b29bde.exe 2600 20a130f06435c43f85976bfef5b29bde.exe 2600 20a130f06435c43f85976bfef5b29bde.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 3032 2600 20a130f06435c43f85976bfef5b29bde.exe 29 PID 2600 wrote to memory of 3032 2600 20a130f06435c43f85976bfef5b29bde.exe 29 PID 2600 wrote to memory of 3032 2600 20a130f06435c43f85976bfef5b29bde.exe 29 PID 2600 wrote to memory of 3032 2600 20a130f06435c43f85976bfef5b29bde.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\20a130f06435c43f85976bfef5b29bde.exe"C:\Users\Admin\AppData\Local\Temp\20a130f06435c43f85976bfef5b29bde.exe"1⤵
- Adds Run key to start application
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Delete.bat" "2⤵
- Deletes itself
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203B
MD5669bad74501fa52e637172a5812f97a1
SHA18ed71c1427cd9d38922998640948cd5f5fa42bfe
SHA256a7da9d8b3a8b4856329c4ba2749df1eb7e0cc09d34085f1e1741d3c634921071
SHA512a3b66ba591f8d078dda3a1c04ad7d7845ce397984c0ad34aba50b5d92d4d4c927122d5027b8b73d665537b73d10268f3fb0f543c05cd5fdf0a34779e0bff3758