Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
8fc24407671c79b675c98492ace8f104.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fc24407671c79b675c98492ace8f104.exe
Resource
win10v2004-20231215-en
General
-
Target
8fc24407671c79b675c98492ace8f104.exe
-
Size
14KB
-
MD5
8fc24407671c79b675c98492ace8f104
-
SHA1
ba12301c575c94aec20f5986d0550eb9c8825979
-
SHA256
d98aab09f963cdc05a6c8e77bd0a75ab45075998b423c67b5edf59ee6371ae1b
-
SHA512
b8f1e6369ab625d3540aeb40be0714637c674e5cb7bacde49d24b263f8dd10f78de20b690eaeebe1a67af47f2ae3975f502bc7fb6df79bdc3ceee0f4340749cc
-
SSDEEP
384:AZGxEZ5FT3Ntxk3Bj93qmmuxBxVppBYklN18ilvHM9QrTUU3WZ0zrze:DOZ5Bq3qm3xbpBYklL8iJkwIS/zne
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vnkatcyy.dll = "{D3112B69-A745-4805-874E-ABD480EA1299}" 8fc24407671c79b675c98492ace8f104.exe -
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 8fc24407671c79b675c98492ace8f104.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vnkatcyy.nls 8fc24407671c79b675c98492ace8f104.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299} 8fc24407671c79b675c98492ace8f104.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299}\InProcServer32 8fc24407671c79b675c98492ace8f104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299}\InProcServer32\ = "C:\\Windows\\SysWow64\\vnkatcyy.dll" 8fc24407671c79b675c98492ace8f104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299}\InProcServer32\ThreadingModel = "Apartment" 8fc24407671c79b675c98492ace8f104.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2380 8fc24407671c79b675c98492ace8f104.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2380 8fc24407671c79b675c98492ace8f104.exe 2380 8fc24407671c79b675c98492ace8f104.exe 2380 8fc24407671c79b675c98492ace8f104.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2616 2380 8fc24407671c79b675c98492ace8f104.exe 28 PID 2380 wrote to memory of 2616 2380 8fc24407671c79b675c98492ace8f104.exe 28 PID 2380 wrote to memory of 2616 2380 8fc24407671c79b675c98492ace8f104.exe 28 PID 2380 wrote to memory of 2616 2380 8fc24407671c79b675c98492ace8f104.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fc24407671c79b675c98492ace8f104.exe"C:\Users\Admin\AppData\Local\Temp\8fc24407671c79b675c98492ace8f104.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\8315.tmp.bat2⤵
- Deletes itself
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5de42ab264bf73f41d7b9ef3240c5f4ea
SHA179888c22ed30916cc13a4ab2d3cfc08ad1cfa98a
SHA2560c72e28d7b1ef785b379037053fb48cc299f8230ee22de2347d7f8485a477871
SHA5125b2bd34aec956f27d6f665a565a57bfaa8ac5bcf1a3bbf1868565ada4e81279c4073fc57fe03995b06779f782226a059d42b5a432e1d4e5589dc507d58f8587b
-
Filesize
83KB
MD56c4d3f1037f7ded0a5baea22b62d08d2
SHA1ea607b2eb7000bb8bfd6a4b4712fa542a24ab00d
SHA2569c6e69cfb9750a00d029caa4845f22a440a7c9a4d92f15106d8fee6196fa618f
SHA51238051bab0c476b768318c27192b6731885c69cd1e2f20ad19be9e37aea1a0d1d575746056f94f635c15626353e3be03b77f572e0165ecf015121632422ac440b
-
Filesize
2.4MB
MD507a46cd27bdfc86b283d4b22872d3047
SHA11bdbb84e1acff69488a2e4bb9a22c49b5b3abb4e
SHA2567bcc05a5d7d7866371fd1f03f2f9490d12b7d8fb04b014a3fb963c89943ea6a7
SHA512b06900154c4bed48d6600f1862ac30779dbeae687a72cb869a1dcfb7dd1cf09be08e95d1d07f5b21ec8ea97302ec738229554c5b04a4acf5578b87b228ca206b