Resubmissions

01/01/2024, 23:38

240101-3m1xzscdhq 7

01/01/2024, 23:28

240101-3f3s1aehc2 3

Analysis

  • max time kernel
    235s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/01/2024, 23:38

General

  • Target

    BRUTEFORCE VK.exe

  • Size

    3.6MB

  • MD5

    eb4dd4ce247786bbcf3e6fe0610211a2

  • SHA1

    358ba3c74bb8db50eda162963f69605cd687b385

  • SHA256

    cccff13d15cf38f57bd01c61366ca1ab0d326e185c4b893c341440577963d4ea

  • SHA512

    3f717eee1d60eca02366b5ac22f0b0f2ddb897a8f74e5cef358ec6c986e319eeccc720f5bb3fc227e7da9cdd3d57501ab95154970936188a62e973fe3a4bd1ac

  • SSDEEP

    1536:G1KRDycUDwj7giX6bS1wb2Wgp9xPebSeR5onZh7iJ49l0kZT6Tiz:SKpycYo7grbS1w7GIbVR5IH7iAT6mz

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BRUTEFORCE VK.exe
    "C:\Users\Admin\AppData\Local\Temp\BRUTEFORCE VK.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4528
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3132
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4528-1-0x0000000000A60000-0x0000000000A7C000-memory.dmp

      Filesize

      112KB

    • memory/4528-0-0x0000000073120000-0x000000007380E000-memory.dmp

      Filesize

      6.9MB

    • memory/4528-3-0x00000000059B0000-0x0000000005A42000-memory.dmp

      Filesize

      584KB

    • memory/4528-2-0x00000000052F0000-0x0000000005300000-memory.dmp

      Filesize

      64KB

    • memory/4528-4-0x0000000005F50000-0x000000000644E000-memory.dmp

      Filesize

      5.0MB

    • memory/4528-5-0x00000000073E0000-0x00000000073F2000-memory.dmp

      Filesize

      72KB

    • memory/4528-6-0x0000000007440000-0x000000000747E000-memory.dmp

      Filesize

      248KB

    • memory/4528-8-0x00000000074F0000-0x0000000007556000-memory.dmp

      Filesize

      408KB

    • memory/4528-7-0x00000000052F0000-0x0000000005300000-memory.dmp

      Filesize

      64KB

    • memory/4528-9-0x0000000007700000-0x000000000779C000-memory.dmp

      Filesize

      624KB

    • memory/4528-10-0x00000000074C0000-0x00000000074D2000-memory.dmp

      Filesize

      72KB

    • memory/4528-13-0x0000000073120000-0x000000007380E000-memory.dmp

      Filesize

      6.9MB

    • memory/4528-14-0x00000000052F0000-0x0000000005300000-memory.dmp

      Filesize

      64KB

    • memory/4528-15-0x00000000052F0000-0x0000000005300000-memory.dmp

      Filesize

      64KB

    • memory/4528-18-0x0000000073120000-0x000000007380E000-memory.dmp

      Filesize

      6.9MB