Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 15:43

General

  • Target

    77c00bd37b3a0208043de3fb65e2e131.exe

  • Size

    217KB

  • MD5

    77c00bd37b3a0208043de3fb65e2e131

  • SHA1

    0fc1fc5a99a7611a2e07f1ea042c4aca23225032

  • SHA256

    5347bc0875f7cf043efd17d2b930ce61ed76a9b5274af58257b4dbf8e85b62ac

  • SHA512

    392a8ede96a9f3b268cecf780e09ddde24159cde0b4e3f041b873007682620c97b6586a7e3ab795f1e606c336718bce7d9ac9bb27d72f0733fdad68f7d913ee0

  • SSDEEP

    6144:838BaAqqmH+hwyIc77Vikky2v9QbK8xbjcqBrPKJ:838cVReR77Vikf2Vz8xv1FPKJ

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe
    "C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe"
    1⤵
    • Modifies firewall policy service
    • Drops file in Drivers directory
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe
      C:\Users\Admin\AppData\Local\Temp\77c00bd37b3a0208043de3fb65e2e131.exe
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:4900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9vpf3974kg.exe.jpg

    Filesize

    217KB

    MD5

    77c00bd37b3a0208043de3fb65e2e131

    SHA1

    0fc1fc5a99a7611a2e07f1ea042c4aca23225032

    SHA256

    5347bc0875f7cf043efd17d2b930ce61ed76a9b5274af58257b4dbf8e85b62ac

    SHA512

    392a8ede96a9f3b268cecf780e09ddde24159cde0b4e3f041b873007682620c97b6586a7e3ab795f1e606c336718bce7d9ac9bb27d72f0733fdad68f7d913ee0

  • memory/64-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/64-10-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/4900-4-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4900-6-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4900-8-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/4900-21-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB