Resubmissions
15-04-2024 11:37
240415-nrnqwsfg3w 1015-04-2024 11:37
240415-nrmtlafg3v 1015-04-2024 11:37
240415-nrmhtsfg3t 1015-04-2024 11:37
240415-nrlxasdd49 1015-04-2024 11:37
240415-nrlarsdd48 1010-04-2024 05:01
240410-fnxkmadd26 1010-04-2024 05:01
240410-fnpj1sdd25 1010-04-2024 05:01
240410-fnnygsdd24 1010-04-2024 05:01
240410-fnjc1add22 10Analysis
-
max time kernel
591s -
max time network
503s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 11:37
Behavioral task
behavioral1
Sample
5cacf2b43b8d5578156df066f2181117.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
5cacf2b43b8d5578156df066f2181117.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
5cacf2b43b8d5578156df066f2181117.exe
Resource
win10-20240319-en
Behavioral task
behavioral4
Sample
5cacf2b43b8d5578156df066f2181117.exe
Resource
win10v2004-20240412-en
General
-
Target
5cacf2b43b8d5578156df066f2181117.exe
-
Size
217KB
-
MD5
5cacf2b43b8d5578156df066f2181117
-
SHA1
7e4e1385713db3e859bdd5ad6b503e7013b37796
-
SHA256
7d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
-
SHA512
c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142
-
SSDEEP
6144:YkriDRJpv8UfcWtfJOxM3zeKqjrdySHy:YkwRT8ctROxM3z/CrcSHy
Malware Config
Extracted
systembc
advertx15.xyz:4044
spacex17.xyz:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vgeccur.exepid process 4288 vgeccur.exe -
Processes:
resource yara_rule behavioral4/memory/920-0-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral4/memory/920-1-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral4/memory/920-2-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral4/memory/920-3-0x0000000000400000-0x0000000000459000-memory.dmp upx C:\ProgramData\uaodh\vgeccur.exe upx behavioral4/memory/4288-15-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral4/memory/4288-17-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral4/memory/4288-19-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral4/memory/4288-21-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
Processes:
5cacf2b43b8d5578156df066f2181117.exedescription ioc process File created C:\Windows\Tasks\vgeccur.job 5cacf2b43b8d5578156df066f2181117.exe File opened for modification C:\Windows\Tasks\vgeccur.job 5cacf2b43b8d5578156df066f2181117.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5cacf2b43b8d5578156df066f2181117.exepid process 920 5cacf2b43b8d5578156df066f2181117.exe 920 5cacf2b43b8d5578156df066f2181117.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"C:\Users\Admin\AppData\Local\Temp\5cacf2b43b8d5578156df066f2181117.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\uaodh\vgeccur.exeC:\ProgramData\uaodh\vgeccur.exe start21⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\uaodh\vgeccur.exeFilesize
217KB
MD55cacf2b43b8d5578156df066f2181117
SHA17e4e1385713db3e859bdd5ad6b503e7013b37796
SHA2567d17668ad7a09802bbf39bd76093ddb9658d74cffaefc3528463b77573802728
SHA512c7a1e2fafc31d2ce366f5130d28835afdb88f9298fede4121c812f2d5222ff8d855f31e11e54b5b44fbc1d376e16103f0a04794baac62618c72f00aaef6a8142
-
memory/920-13-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/920-1-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/920-3-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/920-6-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/920-7-0x00000000027A0000-0x00000000027D4000-memory.dmpFilesize
208KB
-
memory/920-8-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/920-2-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/920-0-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4288-15-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4288-17-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4288-19-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4288-21-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4288-27-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4288-29-0x0000000002740000-0x0000000002774000-memory.dmpFilesize
208KB
-
memory/4288-30-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB