Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 22:00
Behavioral task
behavioral1
Sample
gamesense.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
loader+vacbypass.exe
Resource
win10v2004-20240226-en
General
-
Target
loader+vacbypass.exe
-
Size
80KB
-
MD5
fc7ba0d39de049bfbe8bbea22c662402
-
SHA1
4ed5a84cc422da30edfa6be6485143b5718fd259
-
SHA256
77f2c591f0fd07d923d9ed0c014a7c4cb524aa0d1a293f0de94641d06d7fefb7
-
SHA512
920712f43fd2f541f630e530a79580eee82ecc4c5983604dc8b8286d2baaed050737e8794e644944a752b04452817aeb963dd8263b2d8f99b0a468ab1a22e992
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/oyRp:o23rbZi/8GprF3jg/ocp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1648 wrote to memory of 3048 1648 loader+vacbypass.exe 90 PID 1648 wrote to memory of 3048 1648 loader+vacbypass.exe 90 PID 1648 wrote to memory of 3048 1648 loader+vacbypass.exe 90 PID 3048 wrote to memory of 3560 3048 cmd.exe 91 PID 3048 wrote to memory of 3560 3048 cmd.exe 91 PID 3048 wrote to memory of 3560 3048 cmd.exe 91 PID 1648 wrote to memory of 4740 1648 loader+vacbypass.exe 92 PID 1648 wrote to memory of 4740 1648 loader+vacbypass.exe 92 PID 1648 wrote to memory of 4740 1648 loader+vacbypass.exe 92 PID 1648 wrote to memory of 3324 1648 loader+vacbypass.exe 93 PID 1648 wrote to memory of 3324 1648 loader+vacbypass.exe 93 PID 1648 wrote to memory of 3324 1648 loader+vacbypass.exe 93 PID 1648 wrote to memory of 464 1648 loader+vacbypass.exe 94 PID 1648 wrote to memory of 464 1648 loader+vacbypass.exe 94 PID 1648 wrote to memory of 464 1648 loader+vacbypass.exe 94 PID 1648 wrote to memory of 640 1648 loader+vacbypass.exe 95 PID 1648 wrote to memory of 640 1648 loader+vacbypass.exe 95 PID 1648 wrote to memory of 640 1648 loader+vacbypass.exe 95 PID 640 wrote to memory of 3488 640 cmd.exe 96 PID 640 wrote to memory of 3488 640 cmd.exe 96 PID 640 wrote to memory of 3488 640 cmd.exe 96 PID 1648 wrote to memory of 1432 1648 loader+vacbypass.exe 97 PID 1648 wrote to memory of 1432 1648 loader+vacbypass.exe 97 PID 1648 wrote to memory of 1432 1648 loader+vacbypass.exe 97 PID 1648 wrote to memory of 3676 1648 loader+vacbypass.exe 98 PID 1648 wrote to memory of 3676 1648 loader+vacbypass.exe 98 PID 1648 wrote to memory of 3676 1648 loader+vacbypass.exe 98 PID 1648 wrote to memory of 680 1648 loader+vacbypass.exe 100 PID 1648 wrote to memory of 680 1648 loader+vacbypass.exe 100 PID 1648 wrote to memory of 680 1648 loader+vacbypass.exe 100 PID 1648 wrote to memory of 2436 1648 loader+vacbypass.exe 101 PID 1648 wrote to memory of 2436 1648 loader+vacbypass.exe 101 PID 1648 wrote to memory of 2436 1648 loader+vacbypass.exe 101 PID 1648 wrote to memory of 1020 1648 loader+vacbypass.exe 113 PID 1648 wrote to memory of 1020 1648 loader+vacbypass.exe 113 PID 1648 wrote to memory of 1020 1648 loader+vacbypass.exe 113 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3488 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader+vacbypass.exe"C:\Users\Admin\AppData\Local\Temp\loader+vacbypass.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Window Title2⤵PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:3324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:3488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:1432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:3676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:1020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74