Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 15:43

General

  • Target

    77c00bd37b3a0208043de3fb65e2e131.exe

  • Size

    217KB

  • MD5

    77c00bd37b3a0208043de3fb65e2e131

  • SHA1

    0fc1fc5a99a7611a2e07f1ea042c4aca23225032

  • SHA256

    5347bc0875f7cf043efd17d2b930ce61ed76a9b5274af58257b4dbf8e85b62ac

  • SHA512

    392a8ede96a9f3b268cecf780e09ddde24159cde0b4e3f041b873007682620c97b6586a7e3ab795f1e606c336718bce7d9ac9bb27d72f0733fdad68f7d913ee0

  • SSDEEP

    6144:838BaAqqmH+hwyIc77Vikky2v9QbK8xbjcqBrPKJ:838cVReR77Vikf2Vz8xv1FPKJ

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe
    "C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe"
    1⤵
    • Modifies firewall policy service
    • Drops file in Drivers directory
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe
      C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:1832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9vpf3974kg.exe.jpg

    Filesize

    217KB

    MD5

    77c00bd37b3a0208043de3fb65e2e131

    SHA1

    0fc1fc5a99a7611a2e07f1ea042c4aca23225032

    SHA256

    5347bc0875f7cf043efd17d2b930ce61ed76a9b5274af58257b4dbf8e85b62ac

    SHA512

    392a8ede96a9f3b268cecf780e09ddde24159cde0b4e3f041b873007682620c97b6586a7e3ab795f1e606c336718bce7d9ac9bb27d72f0733fdad68f7d913ee0

  • memory/1832-4-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1832-9-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1832-8-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1832-14-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1832-33-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1992-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1992-7-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB