Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe
Resource
win10v2004-20240412-en
General
-
Target
b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe
-
Size
3.7MB
-
MD5
c199e985dbbec6c53f8c8539050aea30
-
SHA1
7b8580f8bb722d69409aaacd512b133f42a68c6f
-
SHA256
b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad
-
SHA512
de5475c650d37a59b37dcbba580fd90ff0d4a3b1c995d8d69dfb0678645114f54738e4d4e5ed21ac75d1b99f08eb395146e2a9675c82f9ab124694984821f77d
-
SSDEEP
49152:31akMEEnoAXaLetR9wLm7dEgHghWvU+H/TfgKfiKXHoFcI13+mr2LFIIp:QkMEEULetUm6hhMTgfUoz13x2GIp
Malware Config
Signatures
-
Detects executables packed with VMProtect. 5 IoCs
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x00000000009A5000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral1/memory/2076-1-0x0000000000400000-0x00000000009A5000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral1/files/0x000900000001441e-7.dat INDICATOR_EXE_Packed_VMProtect behavioral1/memory/1100-9-0x0000000000400000-0x00000000009A5000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral1/memory/1100-10-0x0000000000400000-0x00000000009A5000-memory.dmp INDICATOR_EXE_Packed_VMProtect -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1100 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2076 b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe 1100 tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1100 2064 taskeng.exe 29 PID 2064 wrote to memory of 1100 2064 taskeng.exe 29 PID 2064 wrote to memory of 1100 2064 taskeng.exe 29 PID 2064 wrote to memory of 1100 2064 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe"C:\Users\Admin\AppData\Local\Temp\b211c08cf3a7f5f5711367addaa868a36f3a3b848b22331a86b379cd748271ad.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2076
-
C:\Windows\system32\taskeng.exetaskeng.exe {19F93AAD-5AF1-472A-BBA9-6006DBF6AEAD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD534db842e7eebaa1975843c228c7d67c9
SHA179b9b1b2a0469324bddf6b04589c826bf089c52a
SHA256e744d445b832eb29256dc612a2195c0da1f074c86d010dbea4c7970a816b6c60
SHA512a9345a6148387166dd1dfb2ff546416fa11e72e09055047d9755964616259dea89b015b3331c377fa1b5c22a92237c5d86146b31ef9a723a2c95b19e195969cd