Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 11:18
Behavioral task
behavioral1
Sample
c87cfb365cc917981fe85f70e405cb7d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c87cfb365cc917981fe85f70e405cb7d.exe
Resource
win10v2004-20240226-en
General
-
Target
c87cfb365cc917981fe85f70e405cb7d.exe
-
Size
29KB
-
MD5
c87cfb365cc917981fe85f70e405cb7d
-
SHA1
0b3c78c5fceea6edd0a54a0f62804c3211379ebe
-
SHA256
0e901764624dcb7bbdaa5488d1fd2cbf6467e42bcd7b466c4ea5f507ec15a4a2
-
SHA512
d04df70a7309253cf0a5d30ac15a9c56d2961ed7931f9a1a4297341ebf4504313808f4bd5a722bf710cf0cca0f45be89e4560437909f3630856bd77c77037811
-
SSDEEP
768:MjraXRFVzcqfmjMCm2wlgMvFvYMl5ClMottY/nXbG:MjrkXlcimQRZtvpslHttCXi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2064 gbvgbv04.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 gbvgbv04.exe 1740 gbvgbv04.exe -
Loads dropped DLL 5 IoCs
pid Process 1252 c87cfb365cc917981fe85f70e405cb7d.exe 1252 c87cfb365cc917981fe85f70e405cb7d.exe 2064 gbvgbv04.exe 1740 gbvgbv04.exe 1740 gbvgbv04.exe -
resource yara_rule behavioral1/memory/1252-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1252-18-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\gbvgbv04.exe c87cfb365cc917981fe85f70e405cb7d.exe File opened for modification C:\Windows\SysWOW64\gbvgbv04.exe c87cfb365cc917981fe85f70e405cb7d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fonts\dbr04029.ttf c87cfb365cc917981fe85f70e405cb7d.exe File opened for modification C:\Windows\fonts\dbr04029.ttf c87cfb365cc917981fe85f70e405cb7d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1252 c87cfb365cc917981fe85f70e405cb7d.exe 2064 gbvgbv04.exe 2064 gbvgbv04.exe 2064 gbvgbv04.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1392 1252 c87cfb365cc917981fe85f70e405cb7d.exe 21 PID 1252 wrote to memory of 2064 1252 c87cfb365cc917981fe85f70e405cb7d.exe 28 PID 1252 wrote to memory of 2064 1252 c87cfb365cc917981fe85f70e405cb7d.exe 28 PID 1252 wrote to memory of 2064 1252 c87cfb365cc917981fe85f70e405cb7d.exe 28 PID 1252 wrote to memory of 2064 1252 c87cfb365cc917981fe85f70e405cb7d.exe 28 PID 1252 wrote to memory of 1740 1252 c87cfb365cc917981fe85f70e405cb7d.exe 29 PID 1252 wrote to memory of 1740 1252 c87cfb365cc917981fe85f70e405cb7d.exe 29 PID 1252 wrote to memory of 1740 1252 c87cfb365cc917981fe85f70e405cb7d.exe 29 PID 1252 wrote to memory of 1740 1252 c87cfb365cc917981fe85f70e405cb7d.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\c87cfb365cc917981fe85f70e405cb7d.exe"C:\Users\Admin\AppData\Local\Temp\c87cfb365cc917981fe85f70e405cb7d.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\gbvgbv04.exeC:\Windows\system32\gbvgbv04.exe C:\Windows\system32\dbr04029.ocx pfjaoidjglkajd C:\Users\Admin\AppData\Local\Temp\c87cfb365cc917981fe85f70e405cb7d.exe3⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Windows\SysWOW64\gbvgbv04.exeC:\Windows\system32\gbvgbv04.exe C:\Windows\system32\dbr99008.ocx pfjieaoidjglkajd3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a35f5becaae224cdcf42829faf2d146b
SHA1fad3f254b61e687032abf33c9cc7c28bc3cb263e
SHA2562d47d47b3a8a7e714c24c4720b51bc462dbbf7357f9fea19451904c3d7ae7ac5
SHA512e97b1685036a3a2ab41960784e0f08b57d26c420c60d37ba3bae12e460ed6d38a0dd1d6decefbc1003c6b1591d30d3c8b9387c027b79a25c91e151d9a164192a
-
Filesize
11KB
MD5fe939fed997e8a51f7969178953f8c51
SHA1998b7aad9252a20f340bac68acc6ab719d20ad62
SHA256306d8061b2ed790624c81ba9a2cd83fafb39e490ba5aa74fa76d3f2fd30c052d
SHA5125b643c48fdb5df297a5c70cde6963ef3a9b041e40cae08161832b863d690d15390b936e667535df4a87168f918f3d60f2b1e28457a095c6f710355580f1e1fb4
-
Filesize
540B
MD5e96b87945f09b6917922c4edc70d5076
SHA1695d3e14ac03604975c19ec0cef30686aaea8a3f
SHA25620c191f12376614e01860060b31c74b9618915a5d021fc4bfac0b5c0e5125f18
SHA51290f2d31180fb4eff3a180bff846c5023d7888cf0f34c946774e1c4130cdbf5a545b4f6d90a867a31f41516588f7081010ddfcce0b298c041f3742e8bd1b7dfc2
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d