Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe
Resource
win10v2004-20240508-en
General
-
Target
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe
-
Size
12KB
-
MD5
244c4da31c3f6f37d13d393570c84890
-
SHA1
b9ca92a613daa7f4aa4a6b2a9acf3e8b538c0759
-
SHA256
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5
-
SHA512
925f5ca9b76885669513e2e1bbd11c8a8c045ac259ddcac8d061dd18712f8273f8f357ad48a26976a155b012e11cfbefd17c028ee2530824cb4bcc943f3880f7
-
SSDEEP
384:GL7li/2zHq2DcEBvdScJKLTp/NK9xapE:gLDIQ9cpE
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
tmp16FB.tmp.exepid process 2716 tmp16FB.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp16FB.tmp.exepid process 2716 tmp16FB.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exepid process 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exedescription pid process Token: SeDebugPrivilege 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exevbc.exedescription pid process target process PID 1716 wrote to memory of 1272 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe vbc.exe PID 1716 wrote to memory of 1272 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe vbc.exe PID 1716 wrote to memory of 1272 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe vbc.exe PID 1716 wrote to memory of 1272 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe vbc.exe PID 1272 wrote to memory of 2976 1272 vbc.exe cvtres.exe PID 1272 wrote to memory of 2976 1272 vbc.exe cvtres.exe PID 1272 wrote to memory of 2976 1272 vbc.exe cvtres.exe PID 1272 wrote to memory of 2976 1272 vbc.exe cvtres.exe PID 1716 wrote to memory of 2716 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe tmp16FB.tmp.exe PID 1716 wrote to memory of 2716 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe tmp16FB.tmp.exe PID 1716 wrote to memory of 2716 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe tmp16FB.tmp.exe PID 1716 wrote to memory of 2716 1716 5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe tmp16FB.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe"C:\Users\Admin\AppData\Local\Temp\5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x0vh0uns\x0vh0uns.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1822.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc37B0A6CEE43E48578E549C701DF5E66.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp16FB.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp16FB.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5a129dcaa628740db378732f37362786d2c9252525c258a7fdd70dea017467d5.exe2⤵
- Deletes itself
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RE.resourcesFilesize
2KB
MD5a96472fd6a51215f9d4384d1e54c34c7
SHA171391b76ba6beb193ffcf740a753d35730b7c398
SHA25623fb880e38ffcc43cdc554661dc7f30a0564768611fd113a7ca64c81139825ce
SHA512c4c17f06a81fb688a8e2a7818df7940aad28b41de70819ff9f69532fe5e2af00ac8c8c85cb81a628c7cd4ce65a7b2109e32cf0c04b9d71dbf4e86094287dba8d
-
C:\Users\Admin\AppData\Local\Temp\RES1822.tmpFilesize
1KB
MD5a1bff1f60ce4792ca7a9955985681e78
SHA114ae9090cd31699b56b2240c9d956e6d0f8e77c4
SHA256fec249ed485859568e7712647d1f9b1c4c85d6dbf7441a191ba4c91b914a5c71
SHA51250bb0270a6692e826ef2684cc3c647c1c1c81bca2002436d3f6d7bfb54a8f0d6c596e167d283205dd947ec0b2ba15ecb120478908bdc05a395892409c68cd9ad
-
C:\Users\Admin\AppData\Local\Temp\tmp16FB.tmp.exeFilesize
12KB
MD59eef9173f74f852da2de14934db9342f
SHA17a8e156a3d98e3f98a57417e03afe4fbd64ce4b2
SHA256349314f6c2912cfb1d8f9111a23e869581c8ea50b31efbc5a5b59c2fcf047fd3
SHA5120d1f05709edbe81c7896112d7283851131a020bfb3bfc862cb852e51dffa88662e2a4f47bbc8689e7aa0f4d45bd8498b59c6e71c46cfb3a67894f317ebc25767
-
C:\Users\Admin\AppData\Local\Temp\vbc37B0A6CEE43E48578E549C701DF5E66.TMPFilesize
1KB
MD5a17f9db9f9871429c296c3faa6a64dbf
SHA112c1778e02def064494875355a403727368049c7
SHA2567fa085f9b66ac2f633edee8e2d7d68a1b4c71a6e09b0a40938cec1a9ad1642fb
SHA512044d26c9664fc3e6872b22194c9cea9e6521e084c6bad0605785c6e5f3755a5f20f24205963bd9d95016c942280fcb14efde83291e7d0dc200d673f564e1d1ce
-
C:\Users\Admin\AppData\Local\Temp\x0vh0uns\x0vh0uns.0.vbFilesize
2KB
MD57abaa5e5b33d333c3ee3decc80f6e896
SHA19caeb7771efd2ce44eb6fdc9f377f8a303ff8db0
SHA256f11a7c5c233b895a0d78b7bea6089f8ad21ff6db61692475ac9724ef0ad3db5e
SHA51237e1d42ab7dab3609df17e5f6026e76be1df335c76da644c263371201ae3a33dba46d0451d71cc1fbd292b50c427cace2517f612e94964c6bcf06c5845fcd5e1
-
C:\Users\Admin\AppData\Local\Temp\x0vh0uns\x0vh0uns.cmdlineFilesize
273B
MD5245ec2207172b5d318e6b70ca54a75e5
SHA18ed871e1b619297443acaf294f12931dab1bea03
SHA2565adc9d6acf1dffed127649aad1ea676a367891bf00fc4d179d0c699a5574cc3a
SHA5125b1359b55fc000340aa617a5a1bcf3f9be7fd5e74a28ef901816e646dc1991aef6b8faf77c42588d30a8055eb30e3cc5859ca3443f5c9ca5b24fb911d935bfed
-
memory/1716-0-0x000000007460E000-0x000000007460F000-memory.dmpFilesize
4KB
-
memory/1716-1-0x0000000000950000-0x000000000095A000-memory.dmpFilesize
40KB
-
memory/1716-8-0x0000000074600000-0x0000000074CEE000-memory.dmpFilesize
6.9MB
-
memory/1716-24-0x0000000074600000-0x0000000074CEE000-memory.dmpFilesize
6.9MB
-
memory/2716-23-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB