Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
3e0266b72ad2153c1617e39efc6765bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e0266b72ad2153c1617e39efc6765bf.exe
Resource
win10v2004-20231215-en
General
-
Target
3e0266b72ad2153c1617e39efc6765bf.exe
-
Size
591KB
-
MD5
3e0266b72ad2153c1617e39efc6765bf
-
SHA1
b7f7f7a18a97262cfc428b37dd3cb84fa0dbb708
-
SHA256
329de8026199da9268abd38e074e8d350b46a69179548b0aff68707162aa8ea6
-
SHA512
9632b7b6f259bf0444cbeda4b2d52e52ac1904f0b92a6cf1dfcbdbca4990efde0af0766ad2dfe87d174155514236e05e6e5befa94ddc1c90bcebed31b1bbf1a6
-
SSDEEP
12288:ZKtwR/bd/s9l9aFEfu2rm3F3Z4mxxsEO6YPXTF8ewBC9sv:4twR/bx89aUNrm3QmXsh6YPXTqn5v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4920 VB_Server1.23.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\VB_Server1.23.exe 3e0266b72ad2153c1617e39efc6765bf.exe File opened for modification C:\Windows\VB_Server1.23.exe 3e0266b72ad2153c1617e39efc6765bf.exe File created C:\Windows\Delete.bat 3e0266b72ad2153c1617e39efc6765bf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4920 VB_Server1.23.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3488 4836 3e0266b72ad2153c1617e39efc6765bf.exe 95 PID 4836 wrote to memory of 3488 4836 3e0266b72ad2153c1617e39efc6765bf.exe 95 PID 4836 wrote to memory of 3488 4836 3e0266b72ad2153c1617e39efc6765bf.exe 95 PID 4920 wrote to memory of 3840 4920 VB_Server1.23.exe 94 PID 4920 wrote to memory of 3840 4920 VB_Server1.23.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0266b72ad2153c1617e39efc6765bf.exe"C:\Users\Admin\AppData\Local\Temp\3e0266b72ad2153c1617e39efc6765bf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:3488
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵PID:3840
-
C:\Windows\VB_Server1.23.exeC:\Windows\VB_Server1.23.exe1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD53e0266b72ad2153c1617e39efc6765bf
SHA1b7f7f7a18a97262cfc428b37dd3cb84fa0dbb708
SHA256329de8026199da9268abd38e074e8d350b46a69179548b0aff68707162aa8ea6
SHA5129632b7b6f259bf0444cbeda4b2d52e52ac1904f0b92a6cf1dfcbdbca4990efde0af0766ad2dfe87d174155514236e05e6e5befa94ddc1c90bcebed31b1bbf1a6