Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 11:58

General

  • Target

    4b5f840d0381c90787577aec69ea7495.exe

  • Size

    248KB

  • MD5

    4b5f840d0381c90787577aec69ea7495

  • SHA1

    d4f8a9670c7b694efb9fa5162a3b3fff23accdaa

  • SHA256

    b342aaf34701e2e7d38d09be6e95d6e5e71950ea1e6c88b0b4d8406f58f59d46

  • SHA512

    1f213978c5124dc7c844fae6c81c5680261f53eafdecc20730e13dc61d17367f97ca6b18d77dd31c78841ecf5b75a26f3cf1106d5c64f980ab1d99df55df481d

  • SSDEEP

    3072:nBLj8ixG7+Y4k3ZKE8z3/evEko/Oe7aTtXIRkLIYJxDBFya:nB3/07+Yt3ZKENvEBOe7aTt4uMYHdU

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 8 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b5f840d0381c90787577aec69ea7495.exe
    "C:\Users\Admin\AppData\Local\Temp\4b5f840d0381c90787577aec69ea7495.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s C:\Windows\System32\vskpj.dll
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:2128
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 vskp3.dll , InstallMyDll
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      PID:2716
    • C:\Windows\SysWOW64\xxggyu.exe
      C:\Windows\system32\xxggyu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of SetWindowsHookEx
      PID:1896
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 375O540.bat
      2⤵
      • Deletes itself
      PID:824

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\xxggyu.exe

          Filesize

          60KB

          MD5

          f5e51ed5e394b66d8e9101ab95aa9af6

          SHA1

          5941f1cf3d5b06b53863e544efe98b535aa875f6

          SHA256

          9bcb7c6e947baad6e27b7a23311df862a4df077f9b2eae89fd20b463722d7c9f

          SHA512

          61f24dfc80bce9cee7915e4306b1a3fdbeb09de22006886af0ca66fe23f92c0a4a4736dcfe4d010ee85e12f98f146680874e811424c5a5f5f649330e266b8a74