Analysis
-
max time kernel
64s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
VC_redist.x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VC_redist.x86.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
VC_redist.x86.exe
-
Size
13.2MB
-
MD5
9882a328c8414274555845fa6b542d1e
-
SHA1
ab4a97610b127d68c45311deabfbcd8aa7066f4b
-
SHA256
510fc8c2112e2bc544fb29a72191eabcc68d3a5a7468d35d7694493bc8593a79
-
SHA512
c08d1aa7e6e6215a0cee2793592b65668066c8c984b26675d2b8c09bc7fee21411cb3c0a905eaee7a48e7a47535fa777de21eeb07c78bca7bf3d7bb17192acf2
-
SSDEEP
196608:oRjgvJ2flpQcIIS/Rj7BWl+aV8t8z72BxBwBgO42BE6+2DQlMp1sHW5ZDmCCM0Xr:IgRIlptVYmfr7yBG/4pXMHsHW76CsGE
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
wuapp.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log wuapp.exe -
Executes dropped EXE 1 IoCs
Processes:
VC_redist.x86.exepid process 1968 VC_redist.x86.exe -
Loads dropped DLL 2 IoCs
Processes:
VC_redist.x86.exeVC_redist.x86.exepid process 1836 VC_redist.x86.exe 1968 VC_redist.x86.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
VC_redist.x86.exedescription pid process target process PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe PID 1836 wrote to memory of 1968 1836 VC_redist.x86.exe VC_redist.x86.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VC_redist.x86.exeC:\Users\Admin\AppData\Local\Temp\VC_redist.x86.exe shutdown -i1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Temp\{21BC7AE5-0FEA-4B19-ADB4-9C9A06F30487}\.cr\VC_redist.x86.exe"C:\Windows\Temp\{21BC7AE5-0FEA-4B19-ADB4-9C9A06F30487}\.cr\VC_redist.x86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\VC_redist.x86.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188 shutdown -i2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
C:\Windows\system32\wuapp.exe"C:\Windows\system32\wuapp.exe" startmenu1⤵
- Drops file in Windows directory
PID:2856
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2916
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1980
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5752cafbd7a1919cdf39fd6f1bcf22e71
SHA133f5d73e01dbc853271c36182f52d9d49e0eed27
SHA2568f8b8da9852df7ea0223ed5345fec40836ed820a266f71c569e5374037ed0278
SHA512667754e8b7bc12920ebc23d2207fc7e0728a5ed020764a2bd395b6633751eef8ce370f78005ca0dd101b1922d2e46cf52e5dde82dac6db18be37f367ba3e38b8
-
Filesize
200KB
MD5b42da783521b1553617032b6e061657a
SHA13e183ae98462df36e17163ff66b929b102a9c71a
SHA256aed7036da57129269f7c206a14af376292da1880688d99f4fed007569eeea9d3
SHA5124c8c726b8745279a990e2383a6eb5839c84b64a2b89dab59cb0666bac16239b0bf77b059f9ef40bdf533c63a33ecf8c3c6a0da901044f18af622cd2c35a80c45
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
576KB
MD5ca35fa07985600f3bc2a299774643826
SHA1e5efcc3dca5357f747a0158771e4034bf9a1050e
SHA256873d6b56f98c6991538b19b9be2249c12f204395b79810c5d114296a456fe402
SHA5122b53f7a11723c529ffe25ea772ca365fc6db1bae37e122af76a4473efcfa05d76ec5429a140206634464eb05c200f3388fd4d7db76c446c72adf6ed47cf10ebe
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2