Analysis
-
max time kernel
144s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
3e0266b72ad2153c1617e39efc6765bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e0266b72ad2153c1617e39efc6765bf.exe
Resource
win10v2004-20231215-en
General
-
Target
3e0266b72ad2153c1617e39efc6765bf.exe
-
Size
591KB
-
MD5
3e0266b72ad2153c1617e39efc6765bf
-
SHA1
b7f7f7a18a97262cfc428b37dd3cb84fa0dbb708
-
SHA256
329de8026199da9268abd38e074e8d350b46a69179548b0aff68707162aa8ea6
-
SHA512
9632b7b6f259bf0444cbeda4b2d52e52ac1904f0b92a6cf1dfcbdbca4990efde0af0766ad2dfe87d174155514236e05e6e5befa94ddc1c90bcebed31b1bbf1a6
-
SSDEEP
12288:ZKtwR/bd/s9l9aFEfu2rm3F3Z4mxxsEO6YPXTF8ewBC9sv:4twR/bx89aUNrm3QmXsh6YPXTqn5v
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 VB_Server1.23.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\VB_Server1.23.exe 3e0266b72ad2153c1617e39efc6765bf.exe File opened for modification C:\Windows\VB_Server1.23.exe 3e0266b72ad2153c1617e39efc6765bf.exe File created C:\Windows\Delete.bat 3e0266b72ad2153c1617e39efc6765bf.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\System VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick VB_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties VB_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm VB_Server1.23.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 VB_Server1.23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2576 2020 3e0266b72ad2153c1617e39efc6765bf.exe 29 PID 2020 wrote to memory of 2576 2020 3e0266b72ad2153c1617e39efc6765bf.exe 29 PID 2020 wrote to memory of 2576 2020 3e0266b72ad2153c1617e39efc6765bf.exe 29 PID 2020 wrote to memory of 2576 2020 3e0266b72ad2153c1617e39efc6765bf.exe 29 PID 2912 wrote to memory of 3028 2912 VB_Server1.23.exe 31 PID 2912 wrote to memory of 3028 2912 VB_Server1.23.exe 31 PID 2912 wrote to memory of 3028 2912 VB_Server1.23.exe 31 PID 2912 wrote to memory of 3028 2912 VB_Server1.23.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0266b72ad2153c1617e39efc6765bf.exe"C:\Users\Admin\AppData\Local\Temp\3e0266b72ad2153c1617e39efc6765bf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
PID:2576
-
-
C:\Windows\VB_Server1.23.exeC:\Windows\VB_Server1.23.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5ac71034f0f508137dde3879d898a2087
SHA138cca2a653f58caf7501978e98d621ac9da9e536
SHA2565ed5d9d612be84aafcb3b743cb6f61ce06511b45a206e7fd405c6d3691c50918
SHA51236fc17729e5c07ffccb105197d763e241609d170c9b9729b7e636d110651eb6f10b96208d747fc286d719e31a4732ccd5589cb774cfe845a44001787b4bfe71c
-
Filesize
591KB
MD53e0266b72ad2153c1617e39efc6765bf
SHA1b7f7f7a18a97262cfc428b37dd3cb84fa0dbb708
SHA256329de8026199da9268abd38e074e8d350b46a69179548b0aff68707162aa8ea6
SHA5129632b7b6f259bf0444cbeda4b2d52e52ac1904f0b92a6cf1dfcbdbca4990efde0af0766ad2dfe87d174155514236e05e6e5befa94ddc1c90bcebed31b1bbf1a6