Resubmissions
18-01-2024 11:10
240118-m9sxwsafh6 718-01-2024 10:53
240118-myyzrshhbk 318-01-2024 10:45
240118-mth3raadc4 3Analysis
-
max time kernel
211s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20231215-it -
resource tags
arch:x64arch:x86image:win10-20231215-itlocale:it-itos:windows10-1703-x64systemwindows -
submitted
18-01-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
VTMBup115rc7.7.exe
Resource
win10-20231215-it
Behavioral task
behavioral2
Sample
VTMBup115rc7.7.exe
Resource
win10-20231215-it
Behavioral task
behavioral3
Sample
VTMBup115rc7.7.exe
Resource
win10v2004-20231215-it
General
-
Target
VTMBup115rc7.7.exe
-
Size
605.5MB
-
MD5
ff9a4a545e10f1e2ea6ca14c03c4375a
-
SHA1
3719af51bea885389f9fb0944bf659f50df151a8
-
SHA256
d5623c6a22d205fcf721d452907bb612207f1718bb355335105ba3b967de3468
-
SHA512
af1ac64a9b498becac1458910179d66c815234808c13189eed8c5974e79b62ac226007a087362c8e99ed5bc9a1c4c41bce86844ecb1e149773f3e174c0b73a47
-
SSDEEP
12582912:CGTH51csuA0D7V996HJz3ll7lmTnfqwZQF4LZRAyrmpfEmPQi/KRKJTtb:Hzvcsux19yll7sfdQF4LZRDIh/KiF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4304 VTMBup115rc7.7.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4304 3452 VTMBup115rc7.7.exe 72 PID 3452 wrote to memory of 4304 3452 VTMBup115rc7.7.exe 72 PID 3452 wrote to memory of 4304 3452 VTMBup115rc7.7.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\VTMBup115rc7.7.exe"C:\Users\Admin\AppData\Local\Temp\VTMBup115rc7.7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\is-AV7H8.tmp\VTMBup115rc7.7.tmp"C:\Users\Admin\AppData\Local\Temp\is-AV7H8.tmp\VTMBup115rc7.7.tmp" /SL5="$70058,633981029,56832,C:\Users\Admin\AppData\Local\Temp\VTMBup115rc7.7.exe"2⤵
- Executes dropped EXE
PID:4304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD52c10db017057dce22651243244e4fee6
SHA1b8ea54a0cbfa98bb866d19e5b800769eea24e881
SHA256e442e83c27e94bc37eb6c02411a88edd8cb83777d50312b9ef7bfc214c4cc7b2
SHA5125f9e014129e4077e8e4745ddc8580890048f09f458d2dee2f3833931e29b6be89cfc7ef71a5837689dd3d25882ef0601ac13ddf36a2b8805092d7cd956e5c8ac