Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 12:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb752b7705fb4b43b960757eb520a1b1.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cb752b7705fb4b43b960757eb520a1b1.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
cb752b7705fb4b43b960757eb520a1b1.exe
-
Size
60KB
-
MD5
cb752b7705fb4b43b960757eb520a1b1
-
SHA1
b6abd6f7abe43784e5145d5f7b20dc53eeac8ae3
-
SHA256
9e4d371ea020cf27f28182a389cd3f2c8a7f2db44aec9f13af16805008d0428c
-
SHA512
f55c48fb72966c9b8206fd1e3f9be66082697d217df42de6cd0fba6b3d3b82b2712a8416ea87459168478f3b37c0f1f8e46697b3eb0731951a890063330b175b
-
SSDEEP
768:b8DTyKYUvXfyUQul4LRBukOXOpNFrNmneIMsx9rfIAtwEmvgDKd2YyTA4tZRz3:b0T8+fyhul4mzWrMfjCI4viGeTvtv3
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Center = "C:\\Windows\\smss.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\Testing = "C:\\ProgramData\\explorer.exe" cb752b7705fb4b43b960757eb520a1b1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\smss.exe vbc.exe File opened for modification C:\Windows\smss.exe vbc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28 PID 2200 wrote to memory of 1700 2200 cb752b7705fb4b43b960757eb520a1b1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb752b7705fb4b43b960757eb520a1b1.exe"C:\Users\Admin\AppData\Local\Temp\cb752b7705fb4b43b960757eb520a1b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:1700
-