Analysis

  • max time kernel
    103s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 00:11

General

  • Target

    2f06a059e40ae464f488b22487502a00N.exe

  • Size

    162KB

  • MD5

    2f06a059e40ae464f488b22487502a00

  • SHA1

    dab08c3c6d85cc0ab1e964b79aa47ed11b793b64

  • SHA256

    b19d7becb686d1b1130ee3e7e3e50c3271b6e4ebdccc91abb15b10749c96fed6

  • SHA512

    925d3aadf3509e1c52defc1d95c70995be19d4c95873b81aded68d828afdc713aaa66a0a40ffbda2d4c54911daeafbbf9e2283e6f199eb8735d8afea5a10a432

  • SSDEEP

    3072:sQc01zAf6QGkBIO20Zlv92cKAArDZz4N9GhbkrNEkE1:sQcygYkBIOFLIyN90QE

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 50 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in Windows directory 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f06a059e40ae464f488b22487502a00N.exe
    "C:\Users\Admin\AppData\Local\Temp\2f06a059e40ae464f488b22487502a00N.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Local\Temp\2f06a059e40ae464f488b22487502a00N.exe
      "C:\Users\Admin\AppData\Local\Temp\2f06a059e40ae464f488b22487502a00N.exe" rg
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Adds Run key to start application
      PID:2328
    • C:\winvsp.exe
      "C:\winvsp.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\winvsp.exe
        "C:\winvsp.exe" rg
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        PID:1916
      • C:\windows\system32\vspconsole.exe
        "C:\windows\system32\vspconsole.exe" wm 3360
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
  • C:\winvsp.exe
    "C:\winvsp.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\winvsp.exe
      "C:\winvsp.exe" rg
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:5108
    • C:\program files\dvm.exe
      "C:\program files\dvm.exe" ws 5028 winvsp
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\AcroRead.msi

          Filesize

          29B

          MD5

          07d4c0c3bd4031c325814063946ddfd9

          SHA1

          12c200bb85943ef2d3e602f8c6ee890c0d01aea5

          SHA256

          4b49d4c40e59c8f82ae9a1bc6ed8c83b3df58167c4d2786650ef6323464ddf0a

          SHA512

          16f6f6819208fbe09ffa51592f2da284b602c45b421eadd823c0214efe9273b656bd81d37cb4dd537e8a76b0ef63f7a86d971b370f0eb020bf8d11d811fa3c0e

        • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\RCX12BB.tmp

          Filesize

          162KB

          MD5

          8641aec768eec572f415bee448fcda32

          SHA1

          420bfff2e4102ef55da64851e6a2f0f2a19a6d52

          SHA256

          2e9852fcec6a78c0b87b7276ea71c61e1a70d9e65cd208157f82743ec571e689

          SHA512

          437037126642a92a19ece3ae35ebcd5e19f3fb48184ba739c3cb34315ce453c97ef3ed56e1dff4e4d4af2ea7aedb5f2e581ae16a597bb088906a54b5cececc12

        • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\RCX2030.tmp

          Filesize

          162KB

          MD5

          0fb724cda7e98846509a0bf499623772

          SHA1

          ed963cff6db08a75c78f7326153916469ea1a3ce

          SHA256

          8938449633cbf9919b8d7c7198a31529c85c3fe10fb457e4307b835bb99b7410

          SHA512

          fa4244a63af97745f8da91207626bdbb894b4945027e622cb537687da10c14b037d283bdc04175db51a1fbebfd22c58b6c81a3f655d64d80d334332a5cc00b9b

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\2f06a059e40ae464f488b22487502a00N.exe.log

          Filesize

          115B

          MD5

          5f2253957958934a8b81921678832b72

          SHA1

          d9b030f94a9f3323fdcdb391192960d840b89723

          SHA256

          ab70783e426113082348a647ea0de73875931662f82b9f2ea4f3a44e5fac1000

          SHA512

          28310f23b744a03f81707d7fb77a9f5fce621bcfc56108b9ff76bbdb4ebc6014380715fef68c8b3c486c9aa4bfc1e66928caa7294bea4d263a18ab8557a96460

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe

          Filesize

          189KB

          MD5

          1c80020dc1f8af4c1f908e7501112b02

          SHA1

          6f0005ba5e47b47f3537ce77cd628b2cccbd9e3d

          SHA256

          e06604a05d67b2e820316d7727d0acf1f3a826af6d7a46e8a30c303619e7d5c9

          SHA512

          f3c2db75abdd649042ec435e597577ffa85914b8486df7f9cd32cac8d29aafefaa449c5d46674860ee67b7eb7bf1ea88d4750d67981ebd2b8cb1b79cfbf96b9f

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\RCX32FA.tmp

          Filesize

          186KB

          MD5

          a2493f5d803e029a939523c7376b0047

          SHA1

          00849dd2ddb96d8487f15f44c3995d5ad917e7d6

          SHA256

          002730cf6cfb8bf3bf2b9a677141bca64feea9cee2398183a706653065e2c9ba

          SHA512

          a33a894cd918c1eb535f6ed8855dc9d60c186e37dc58c3180b74398047e95037b55a3a0bf00a8e05b764bbdc6be855368a83ab685c6a6c8d6a5fd8ff9d666d35

        • C:\Windows\System32\RCXC9AB.tmp

          Filesize

          161KB

          MD5

          9246cd6b32f0112623ddd79ff5e1fd7b

          SHA1

          bcc9fc43a3e9baf788c8d7f35fbc28862949e8af

          SHA256

          2097cb98bd0fc3093fb7def75d0d5b68ee3b74605d50181c75c45ba4ef786ea7

          SHA512

          b992c004410d9ff1eff66095cff9c1e3131c32974a0894492fa24001b2e1aa30b3ea5bb2d9936d061329b6558cc19df632b1b1aa1bb1d53ca20a4ae0ad338f97

        • C:\Windows\System32\winvsp.exe

          Filesize

          162KB

          MD5

          2f06a059e40ae464f488b22487502a00

          SHA1

          dab08c3c6d85cc0ab1e964b79aa47ed11b793b64

          SHA256

          b19d7becb686d1b1130ee3e7e3e50c3271b6e4ebdccc91abb15b10749c96fed6

          SHA512

          925d3aadf3509e1c52defc1d95c70995be19d4c95873b81aded68d828afdc713aaa66a0a40ffbda2d4c54911daeafbbf9e2283e6f199eb8735d8afea5a10a432

        • \??\c:\windows\system32\winvsp.exe

          Filesize

          64KB

          MD5

          1214f1d42bf7354c652bbc6c829f813f

          SHA1

          f91d5a074974fcb30f837e7390287d3b8a750a03

          SHA256

          48d25b9d08c819fa94355cac46944843c8b781ec3f47ec3961beac238a90c9df

          SHA512

          226c236a278cfaf123f36486a0b99a5ec7d8cc50e51bbe6d5b0b782c7aaf2eb6d045a52921c5b9087bdd4af64831d4907d536b5cee10a8aafc67508ab6b5b624

        • memory/512-209-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/512-215-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/512-7-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/512-0-0x00007FFDBBE85000-0x00007FFDBBE86000-memory.dmp

          Filesize

          4KB

        • memory/512-6-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/512-3-0x000000001BD20000-0x000000001BD40000-memory.dmp

          Filesize

          128KB

        • memory/512-2-0x000000001C3A0000-0x000000001C86E000-memory.dmp

          Filesize

          4.8MB

        • memory/512-1-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/3360-217-0x000000001B280000-0x000000001B298000-memory.dmp

          Filesize

          96KB

        • memory/3360-621-0x000000001E4D0000-0x000000001E7DE000-memory.dmp

          Filesize

          3.1MB

        • memory/3360-219-0x000000001C550000-0x000000001C5EC000-memory.dmp

          Filesize

          624KB

        • memory/3360-1019-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/3360-1021-0x0000000020CB0000-0x0000000020CEE000-memory.dmp

          Filesize

          248KB

        • memory/3360-1020-0x0000000020D00000-0x0000000020D49000-memory.dmp

          Filesize

          292KB

        • memory/3360-218-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/3360-216-0x00007FFDBBBD0000-0x00007FFDBC571000-memory.dmp

          Filesize

          9.6MB

        • memory/5028-402-0x000000001AE30000-0x000000001AE38000-memory.dmp

          Filesize

          32KB

        • memory/5028-401-0x000000001C130000-0x000000001C192000-memory.dmp

          Filesize

          392KB