Resubmissions
26-05-2024 07:53
240526-jq9jracf36 10Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe
Resource
win7-20240508-en
General
-
Target
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe
-
Size
662KB
-
MD5
0dd1f6c2b9bf477115701a1340d8d9a2
-
SHA1
7b074f54130217609435efe3f45ba38d363dd381
-
SHA256
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711
-
SHA512
a3c8bcc7fe527eb2de6a6dd230bca9b4424653c6e251c1113bc27bd8c42cf79e1be1974e20c733e51be38f2c222ee1338257fd86209f2411f86e5f65213206e6
-
SSDEEP
12288:GubsNSOetfARQAPyGUu7zNubsNSOetfARQAPyGUfT+tkrvdv:GubsnafAPyjSzNubsnafAPyjZrvh
Malware Config
Extracted
systembc
cobusabobus.cam:4001
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1380 work.exe 2968 pogflaw.exe 2568 vddgdcc.exe 2624 vddgdcc.exe -
Loads dropped DLL 5 IoCs
pid Process 2816 cmd.exe 1380 work.exe 1380 work.exe 1380 work.exe 1380 work.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\vddgdcc.job pogflaw.exe File opened for modification C:\Windows\Tasks\vddgdcc.job pogflaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2968 pogflaw.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2816 2812 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe 28 PID 2812 wrote to memory of 2816 2812 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe 28 PID 2812 wrote to memory of 2816 2812 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe 28 PID 2812 wrote to memory of 2816 2812 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe 28 PID 2816 wrote to memory of 1380 2816 cmd.exe 30 PID 2816 wrote to memory of 1380 2816 cmd.exe 30 PID 2816 wrote to memory of 1380 2816 cmd.exe 30 PID 2816 wrote to memory of 1380 2816 cmd.exe 30 PID 1380 wrote to memory of 2968 1380 work.exe 31 PID 1380 wrote to memory of 2968 1380 work.exe 31 PID 1380 wrote to memory of 2968 1380 work.exe 31 PID 1380 wrote to memory of 2968 1380 work.exe 31 PID 2792 wrote to memory of 2568 2792 taskeng.exe 33 PID 2792 wrote to memory of 2568 2792 taskeng.exe 33 PID 2792 wrote to memory of 2568 2792 taskeng.exe 33 PID 2792 wrote to memory of 2568 2792 taskeng.exe 33 PID 2792 wrote to memory of 2624 2792 taskeng.exe 36 PID 2792 wrote to memory of 2624 2792 taskeng.exe 36 PID 2792 wrote to memory of 2624 2792 taskeng.exe 36 PID 2792 wrote to memory of 2624 2792 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe"C:\Users\Admin\AppData\Local\Temp\bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {484EBBFC-9EAC-4A2C-BACD-CBD1759F1D34} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\ProgramData\wfium\vddgdcc.exeC:\ProgramData\wfium\vddgdcc.exe start22⤵
- Executes dropped EXE
PID:2568
-
-
C:\ProgramData\wfium\vddgdcc.exeC:\ProgramData\wfium\vddgdcc.exe start22⤵
- Executes dropped EXE
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
335KB
MD5577cc10d77b4ee44f8613fc7df186048
SHA11d188a807f9a7c55f62ccd4820fe8b89fb8d9e8b
SHA256e871608d80293f723b1f44f465054f8a6528c2b0354435b9360aeb849a29701c
SHA5126183b03eaeb88e8ea1ef2ccedb65cbd04fc05c028ce8e2f9e0aed6636717e1e7c9994a8fb9cf4ebf36e277618db7f612a2af4557749b1f6ef6c2b115837618fa
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e