Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 10:05
Behavioral task
behavioral1
Sample
3c927bdc2453159860c4ea2f7caa4829.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c927bdc2453159860c4ea2f7caa4829.exe
Resource
win10v2004-20231215-en
General
-
Target
3c927bdc2453159860c4ea2f7caa4829.exe
-
Size
1.0MB
-
MD5
3c927bdc2453159860c4ea2f7caa4829
-
SHA1
6f72a48428acb7a93ef04bbc0917c4b8f5ec48bb
-
SHA256
d9a7a433ddc5ff71e433b1ebad3b378144d3b9d8540a32ce457fc55db6c6548c
-
SHA512
fe2aa5844e2c7bce4c5fcb095b520f13e81957513ac00ebbae59626f46caf685770c20c7674f729657346e5a3b405d2875d4c946bea4145bd223a755ef57fab6
-
SSDEEP
24576:DxCnB5605J0labh+LCOVRvzdzQ1B/tNCIyknd3Y:kb605Klabh+L71JzQX//Cvm3Y
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2992 vdm0.88.exe 3052 EA Games Generic Multi Keygen fff-ea179.exe -
Loads dropped DLL 3 IoCs
pid Process 2784 3c927bdc2453159860c4ea2f7caa4829.exe 2784 3c927bdc2453159860c4ea2f7caa4829.exe 2784 3c927bdc2453159860c4ea2f7caa4829.exe -
resource yara_rule behavioral1/memory/2784-2-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral1/memory/2784-14-0x0000000000400000-0x000000000052B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2992 2784 3c927bdc2453159860c4ea2f7caa4829.exe 20 PID 2784 wrote to memory of 2992 2784 3c927bdc2453159860c4ea2f7caa4829.exe 20 PID 2784 wrote to memory of 2992 2784 3c927bdc2453159860c4ea2f7caa4829.exe 20 PID 2784 wrote to memory of 2992 2784 3c927bdc2453159860c4ea2f7caa4829.exe 20 PID 2784 wrote to memory of 3052 2784 3c927bdc2453159860c4ea2f7caa4829.exe 19 PID 2784 wrote to memory of 3052 2784 3c927bdc2453159860c4ea2f7caa4829.exe 19 PID 2784 wrote to memory of 3052 2784 3c927bdc2453159860c4ea2f7caa4829.exe 19 PID 2784 wrote to memory of 3052 2784 3c927bdc2453159860c4ea2f7caa4829.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c927bdc2453159860c4ea2f7caa4829.exe"C:\Users\Admin\AppData\Local\Temp\3c927bdc2453159860c4ea2f7caa4829.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\EA Games Generic Multi Keygen fff-ea179.exe"C:\Users\Admin\AppData\Local\Temp\EA Games Generic Multi Keygen fff-ea179.exe"2⤵
- Executes dropped EXE
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\vdm0.88.exe"C:\Users\Admin\AppData\Local\Temp\vdm0.88.exe"2⤵
- Executes dropped EXE
PID:2992
-
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 784 "C:\Users\Admin\AppData\Local\Temp\vdm0.88.exe"1⤵PID:2728
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 800 "C:\Windows\SysWOW64\slvhost.exe"2⤵PID:1780
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 812 "C:\Windows\SysWOW64\slvhost.exe"3⤵PID:1924
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 804 "C:\Windows\SysWOW64\slvhost.exe"4⤵PID:3020
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 332 "C:\Windows\SysWOW64\slvhost.exe"5⤵PID:2720
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 476 "C:\Windows\SysWOW64\slvhost.exe"6⤵PID:1708
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 816 "C:\Windows\SysWOW64\slvhost.exe"7⤵PID:568
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 832 "C:\Windows\SysWOW64\slvhost.exe"8⤵PID:1172
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 824 "C:\Windows\SysWOW64\slvhost.exe"9⤵PID:2928
-
C:\Windows\SysWOW64\slvhost.exeC:\Windows\system32\slvhost.exe 840 "C:\Windows\SysWOW64\slvhost.exe"10⤵PID:2636
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5ee1eafcf810f721d145e6131232c679d
SHA174c25c16718e2951eeadbad6df1c825df46ccec7
SHA256dbde192834e5a815a195e677b212b0c7ea828633a51a3613c6a9912ba762529d
SHA512ddb769ca93308a6f30649caeea78417fb5a7c729ee69fb16fc5a7248d0ec9b0ecff277daa84c2ca69f0ddb54c658fb8402ea1fdaab6600cdfc56f8d7037cb68e
-
Filesize
387KB
MD57a1a01b9946cac8836c3ba0db993edb9
SHA18386decbd34891e54261cbf5c53df2e1b890bf6a
SHA2565033862e17206bd89b52a8b251c3cc9522ae0e919581003b4ab3e0731907e987
SHA5127eaee6195c0776bd1ddf9b68b45fedfca5dc16522825d0b0305219a6a4738aaaf74a096a9030ff65cbcd8afba49c053353a434a42d1cb1e56374bc26ab1b78c4