Malware Analysis Report

2025-08-10 22:12

Sample ID 240614-bls27sshrj
Target 3f8831d9261238251e36422d413ea006.bin
SHA256 37f5c9fa0cee5064fffe91676e2c58086c36c9601285ebcf361763333fab6e35
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

37f5c9fa0cee5064fffe91676e2c58086c36c9601285ebcf361763333fab6e35

Threat Level: Shows suspicious behavior

The file 3f8831d9261238251e36422d413ea006.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary


Uses the VBS compiler for execution

Suspicious use of SetThreadContext

Program crash

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-14 01:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 01:14

Reported

2024-06-14 01:16

Platform

win7-20240611-en

Max time kernel

120s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe"

Signatures

Uses the VBS compiler for execution

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1696 set thread context of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1696 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1696 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1696 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1696 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1696 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1696 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1696 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\calc.exe
PID 1696 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\calc.exe
PID 1696 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\calc.exe
PID 1696 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\calc.exe
PID 1696 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\calc.exe
PID 1696 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
PID 1696 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
PID 1696 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
PID 1696 wrote to memory of 2120 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
PID 1696 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 1696 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 1696 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 1696 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 1696 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 1696 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 2680 wrote to memory of 772 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Windows\SysWOW64\WerFault.exe
PID 2680 wrote to memory of 772 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Windows\SysWOW64\WerFault.exe
PID 2680 wrote to memory of 772 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Windows\SysWOW64\WerFault.exe
PID 2680 wrote to memory of 772 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe

"C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"

C:\Windows\System32\calc.exe

"C:\Windows\System32\calc.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Program Files (x86)\Windows Media Player\wmplayer.exe

"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"

C:\Program Files (x86)\Windows Media Player\wmplayer.exe

"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 68

Network

N/A

Files

memory/1696-0-0x000007FEF6243000-0x000007FEF6244000-memory.dmp

memory/1696-1-0x0000000000CF0000-0x0000000000CFE000-memory.dmp

memory/1696-2-0x000007FEF6240000-0x000007FEF6C2C000-memory.dmp

memory/1696-3-0x000000001B590000-0x000000001B62A000-memory.dmp

memory/2208-4-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2208-7-0x0000000000400000-0x0000000000443000-memory.dmp

memory/1696-23-0x000007FEF6240000-0x000007FEF6C2C000-memory.dmp

memory/2680-21-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2680-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2680-22-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2680-24-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2680-25-0x0000000000890000-0x0000000000B93000-memory.dmp

memory/2680-26-0x0000000000400000-0x0000000000443000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 01:14

Reported

2024-06-14 01:16

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe"

Signatures

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 232 set thread context of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 232 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 232 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 232 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 232 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\System32\cmd.exe
PID 232 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
PID 232 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe

"C:\Users\Admin\AppData\Local\Temp\d49838ebe358d49ea93e8a761ee9a0d3a5bf08d1846c58314148f93d4070db61.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3476 -ip 3476

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 212

Network

Files

memory/232-0-0x00007FFF7CB13000-0x00007FFF7CB15000-memory.dmp

memory/232-1-0x00000256F2170000-0x00000256F217E000-memory.dmp

memory/232-2-0x00007FFF7CB10000-0x00007FFF7D5D1000-memory.dmp

memory/232-3-0x00000256F58C0000-0x00000256F595A000-memory.dmp

memory/3476-4-0x0000000000400000-0x0000000000443000-memory.dmp

memory/232-5-0x00007FFF7CB10000-0x00007FFF7D5D1000-memory.dmp

memory/3476-6-0x0000000001390000-0x00000000016DA000-memory.dmp

memory/3476-7-0x0000000000400000-0x0000000000443000-memory.dmp

memory/3476-8-0x0000000000400000-0x0000000000443000-memory.dmp

memory/3476-9-0x0000000000400000-0x0000000000443000-memory.dmp