Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 15:34
Behavioral task
behavioral1
Sample
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe
Resource
win7-20240221-en
General
-
Target
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe
-
Size
16KB
-
MD5
c661a77c31f83c413a96b5537ad31989
-
SHA1
8a5a47e39a9efa9dc4de447d2ae4cd5e375e3557
-
SHA256
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1
-
SHA512
b86e45d36d8566b51f932f660ee9c3d79cea1a2eb34a9f7da7b2ccc5e50c74f319e8005e43d719c5722ec148ddddf1351a7f9edc430888e572b3884d1610b1aa
-
SSDEEP
384:rC+AHNZw/WnlrobdglGbLMoy+yG+yir1dV:r0gklrydgQP1yO67V
Malware Config
Extracted
systembc
clwtumberaero.cyou:4001
185.43.220.45:4001
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vdofed.exevdofed.exepid process 2556 vdofed.exe 1644 vdofed.exe -
Drops file in Windows directory 2 IoCs
Processes:
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exedescription ioc process File created C:\Windows\Tasks\vdofed.job cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe File opened for modification C:\Windows\Tasks\vdofed.job cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exepid process 2492 cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
taskeng.exedescription pid process target process PID 2908 wrote to memory of 2556 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 2556 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 2556 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 2556 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 1644 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 1644 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 1644 2908 taskeng.exe vdofed.exe PID 2908 wrote to memory of 1644 2908 taskeng.exe vdofed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe"C:\Users\Admin\AppData\Local\Temp\cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
C:\Windows\system32\taskeng.exetaskeng.exe {8155758E-A3FF-4034-8430-1ED592126C6A} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\ProgramData\nmgcm\vdofed.exeC:\ProgramData\nmgcm\vdofed.exe start22⤵
- Executes dropped EXE
PID:2556
-
-
C:\ProgramData\nmgcm\vdofed.exeC:\ProgramData\nmgcm\vdofed.exe start22⤵
- Executes dropped EXE
PID:1644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5c661a77c31f83c413a96b5537ad31989
SHA18a5a47e39a9efa9dc4de447d2ae4cd5e375e3557
SHA256cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1
SHA512b86e45d36d8566b51f932f660ee9c3d79cea1a2eb34a9f7da7b2ccc5e50c74f319e8005e43d719c5722ec148ddddf1351a7f9edc430888e572b3884d1610b1aa