Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe
Resource
win10v2004-20240426-en
General
-
Target
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe
-
Size
12KB
-
MD5
50f163f704c404eb0b78557faa9853d7
-
SHA1
8e5ba381b671052fef2bc83e8cd57417e0905655
-
SHA256
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8
-
SHA512
1e7f7ea054e0539564cb29ab4fe68a2a56905f61275aa46b9bacd08f271548b88a1996495418e3d18e403b8ba90a0bedcbaba78ec9b3d6a62ef737e946e481ce
-
SSDEEP
384:AL7li/2zuq2DcEQvdhcJKLTp/NK9xaNeh:eWM/Q9cNeh
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
tmp8B6F.tmp.exepid process 1132 tmp8B6F.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp8B6F.tmp.exepid process 1132 tmp8B6F.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exepid process 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exedescription pid process Token: SeDebugPrivilege 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exevbc.exedescription pid process target process PID 1500 wrote to memory of 1396 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe vbc.exe PID 1500 wrote to memory of 1396 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe vbc.exe PID 1500 wrote to memory of 1396 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe vbc.exe PID 1500 wrote to memory of 1396 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe vbc.exe PID 1396 wrote to memory of 2660 1396 vbc.exe cvtres.exe PID 1396 wrote to memory of 2660 1396 vbc.exe cvtres.exe PID 1396 wrote to memory of 2660 1396 vbc.exe cvtres.exe PID 1396 wrote to memory of 2660 1396 vbc.exe cvtres.exe PID 1500 wrote to memory of 1132 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe tmp8B6F.tmp.exe PID 1500 wrote to memory of 1132 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe tmp8B6F.tmp.exe PID 1500 wrote to memory of 1132 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe tmp8B6F.tmp.exe PID 1500 wrote to memory of 1132 1500 5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe tmp8B6F.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe"C:\Users\Admin\AppData\Local\Temp\5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pvibg5f0\pvibg5f0.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES901F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1934DD31B6D64170A3DE57B4F34A36A6.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp8B6F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8B6F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5957cb4625bab12f727ca4cacf88813a8d853a3ec373643754109bca963ad1c8.exe2⤵
- Deletes itself
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RE.resourcesFilesize
2KB
MD5e4ca94cac2ac82bb1d4838d81949ed7d
SHA1a1ab0b2e864948a6c5f7ced778994c20a451b5bd
SHA256187c3da57885ba972bb6ce615045e9877b71ba401764ea1ef3a64a79d9ad661f
SHA5123c12c66491f50b2a67429e31118a107d12ced9755056af4fe02de250fdbb4f60ed7a9b5950f1615fb00afda5dac138ae326845570d4767396757942642423f6d
-
C:\Users\Admin\AppData\Local\Temp\RES901F.tmpFilesize
1KB
MD5c187e308bfc9ae3741402d62c4bc06c1
SHA12ec61f93df13894146d895920f460ae3af211b7b
SHA256481e189c710bf6877c8bf78bdc69d991079fed3082cd315019cf4be0bc66b6b7
SHA512732b7d1a011ad1d3baed360e753ba58fe71948719c83061048f1adec817368d9ba614bcea125d2f8b33a9a8da9881957a8576e96c6f83db4d2077c36bfa79243
-
C:\Users\Admin\AppData\Local\Temp\pvibg5f0\pvibg5f0.0.vbFilesize
2KB
MD57ab119867f6ab2b66a14adc47ba0e3a7
SHA1c1dc93d6cd94a0c163a1a95d89240a61ea5153ac
SHA2569f4345f6b5061210a784a238a70a997d37a999df063be0dbdf2dd3fa16b3609d
SHA512571dab1b75e7e2058f97afb071a9935eecf1882447b258ff17638df997db5b975d8448909933b073d88105468ee77e32d3e4091e8ef88b43b6c4cee9b72e3822
-
C:\Users\Admin\AppData\Local\Temp\pvibg5f0\pvibg5f0.cmdlineFilesize
273B
MD5c1579e035c893f4c5240f2f3540a8c2f
SHA15281d655096fd2496119eaa6c1d0d5f6632e348c
SHA2565b65c670f1a8c5f7b948c70e89945523b05e4c7f486e3c9f6c580e4b51cb0061
SHA51243b256da31ef1132d261b54dca962a28b95afd342daec13a2458fae00f9b1f767dd0f85f216bf50898eb0a1b95f047fa29a274a8a672f6adc3a0f789f680d995
-
C:\Users\Admin\AppData\Local\Temp\tmp8B6F.tmp.exeFilesize
12KB
MD57f52a10450626ec73f35134f229d1bd8
SHA1f6b174f1a434abfb043194cdc72c644f42d5bfc1
SHA256a20a70735e0686ab6c8fcf419d0cc021c0601c76bc456212d8c779f47d49b5c9
SHA5122b718a3b1bfadd3d3225713a471000865d097872a85e7671312603250443bcb2c032d65ebc9a1c4b0df96e2266c8504fb4ae61669e6094be67c2586038ae3026
-
C:\Users\Admin\AppData\Local\Temp\vbc1934DD31B6D64170A3DE57B4F34A36A6.TMPFilesize
1KB
MD5579ef4fc3c3392b5f438db8082cff6b3
SHA1c85022d8fdf4216d92afd136f8a288d3ae3cb480
SHA2563a96c980e15bf029bff6087da3dc2b9dd0fa96e3636514d96b861ff5fb712cb7
SHA512df968ebabad58f26ff66e8cfb157f44e6c759777e43b15665dae2212031398bb3f857ef8d829790b901db2a879d8239db7a7af9b9428cb18a828577c1a75f9d6
-
memory/1132-23-0x00000000011D0000-0x00000000011DA000-memory.dmpFilesize
40KB
-
memory/1500-0-0x0000000074A4E000-0x0000000074A4F000-memory.dmpFilesize
4KB
-
memory/1500-1-0x0000000000990000-0x000000000099A000-memory.dmpFilesize
40KB
-
memory/1500-7-0x0000000074A40000-0x000000007512E000-memory.dmpFilesize
6.9MB
-
memory/1500-24-0x0000000074A40000-0x000000007512E000-memory.dmpFilesize
6.9MB