Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-06-2024 21:33

General

  • Target

    Vaydeer multimedia knob.exe

  • Size

    117.8MB

  • MD5

    0b1cee5f3dde4f08798f289429041adc

  • SHA1

    186b44ba8995570e9c8de7e6bd804f1a7efe0a11

  • SHA256

    caca49743c770aa5375cac879dc14b80ef48f11d2451f4449e339a44a0939c44

  • SHA512

    cd6e6170cee691e303f85e5efab8b137cec0d0cdd9877b51db0efbd45218b6287f80cdad86cc5dae144f776338ac41d237899baf65c2b7257fc5211f3661ed88

  • SSDEEP

    1572864:FsUh7AnP+tF2Luxxoy1XOAGcW0b4C6jwfEgZ2oyRYqcairhkmGhL9UdFUn+FwarP:I4nlO+zVGmGrarOV4CyIhi

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
    "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
      "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe" --type=gpu-process --field-trial-handle=1684,14295961634741354522,16132790538775234471,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:2
      2⤵
        PID:4052
      • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
        "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1684,14295961634741354522,16132790538775234471,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob" --mojo-platform-channel-handle=2136 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4316
      • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
        "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1684,14295961634741354522,16132790538775234471,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2404 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:368
      • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
        "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1684,14295961634741354522,16132790538775234471,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:1216
      • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
        "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1684,14295961634741354522,16132790538775234471,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:4768
      • C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe
        "C:\Users\Admin\AppData\Local\Temp\Vaydeer multimedia knob.exe" --type=gpu-process --field-trial-handle=1684,14295961634741354522,16132790538775234471,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2996 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4824
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob\config.json

        Filesize

        54B

        MD5

        9276b0c4b2deb06ec890cac9ff36da59

        SHA1

        7304b67e569cce4fa5d1963eae10b1a12d51e5ba

        SHA256

        c234a2cb7b6159220ad73a628fb37bb6b1dff42f300057db581cda026d4bdb26

        SHA512

        3442a3dc3adb0d39ae42cb5b54fee87ce18a7cbb64f51cf89075917518008eb5db2df279d591166bd8cba0feeb6f226ffc7dda6c737496e8e715090989687e4e

      • C:\Users\Admin\AppData\Roaming\vaydeer-multimedia-knob\ee51fd39-308f-4fa2-8e93-ef0287eaf6f0.tmp

        Filesize

        57B

        MD5

        58127c59cb9e1da127904c341d15372b

        SHA1

        62445484661d8036ce9788baeaba31d204e9a5fc

        SHA256

        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

        SHA512

        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

      • memory/4824-73-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-74-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-72-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-78-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-80-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-84-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-83-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-82-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-81-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB

      • memory/4824-79-0x000000000DC80000-0x000000000DC81000-memory.dmp

        Filesize

        4KB