Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 20:15

General

  • Target

    247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe

  • Size

    5.6MB

  • MD5

    258d41651f71dd9495dc17e8f2702fe7

  • SHA1

    4f971fd160499ec0200f784503a12191d894b8b0

  • SHA256

    247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410

  • SHA512

    b8e8edce5e33bd5a59c615a9a8a8ad08a702e92e794bef9c3a80718538fd208c44a06a6981faaf3edd2f5a4e882662c4654db0929e6145386e2b729da6ffb639

  • SSDEEP

    98304:ExeeHncufaoTlD8AOrXQ9UR8pzePsAOmUevOshs0EOQC5oqYITMzdhHHQ82d:ExHffaoRD8AKQSe+sGUeFnEOQEofz/QD

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe
    "C:\Users\Admin\AppData\Local\Temp\247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:2440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

      Filesize

      92B

      MD5

      b93e4dff6366cad398fa944fe30bdc48

      SHA1

      156056d76954122703fd8bef8624c4513afc0a56

      SHA256

      26d2948e0475bbfeb8fd453cd5c009401a79580f07f04e0b268a867f790672ee

      SHA512

      2bdfe257925bd5f56b8e60d971424fc50f38ab90f2adecf16bc58790765c9997b3c9e8e7224fe0ef056095e721bcd5c62e1c2d7aa1c4ed537ae63acee1c4e174

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      753B

      MD5

      318f74dafcc38e50d03eb0d4766dc65b

      SHA1

      d04b95993123d3f8f7e0d95efec90d36f3783630

      SHA256

      82b6f39c9eb11af65d67943aea9ad85bf402bf21f9a6a238806d9934a9301581

      SHA512

      556be7f449ae988f637199e5c53c60b773ad69eeecc0d75786dc1252de6ca87dff5eeda95318057eff39991e11cc6ecc5ebb39d71e3c5f1f476e1a9e41c5926b

    • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      5.6MB

      MD5

      1501971858855227cc62a2a82b859eb6

      SHA1

      1f66eecaba8cd396a3832af97a2cbd0c76d01643

      SHA256

      966ba06da5516970aa90e1f38ceab31f910a8345a7c8be737c09e7b0042b37f3

      SHA512

      2b08c8c2bc376736a4c954dc29247323ee5773d4f2f38023dd967ae089717f823f8565c41105f24b15d10ddffbf59ad4c6d4a64a62a7bb5637a76fd03f88a703

    • memory/2188-24-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2188-29-0x00000000002D0000-0x00000000002D1000-memory.dmp

      Filesize

      4KB

    • memory/2188-7-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/2188-9-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/2188-11-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/2188-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/2188-16-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/2188-21-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/2188-19-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/2188-2-0x0000000000400000-0x0000000000E2A000-memory.dmp

      Filesize

      10.2MB

    • memory/2188-26-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2188-6-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2188-31-0x00000000002D0000-0x00000000002D1000-memory.dmp

      Filesize

      4KB

    • memory/2188-32-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2188-36-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2188-34-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2188-38-0x00000000773F0000-0x00000000773F1000-memory.dmp

      Filesize

      4KB

    • memory/2188-0-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2188-4-0x0000000000400000-0x0000000000E2A000-memory.dmp

      Filesize

      10.2MB

    • memory/2188-56-0x0000000000400000-0x0000000000E2A000-memory.dmp

      Filesize

      10.2MB

    • memory/2188-3-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB