Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
6addcb901f0f13cdd57f54936d098840N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6addcb901f0f13cdd57f54936d098840N.exe
Resource
win10v2004-20240709-en
General
-
Target
6addcb901f0f13cdd57f54936d098840N.exe
-
Size
208KB
-
MD5
6addcb901f0f13cdd57f54936d098840
-
SHA1
8f8d36a26d9b0adc41b85eacf45f2b6f9ff1d6a8
-
SHA256
29001129136619672260f2b543a7effc54385c41f10b942c8ba90768d34696ca
-
SHA512
5319adc9f449212a3730fd88ec4accc2cd1530201c43ff32f58e6c1ad29a2ddf24455b905e90bc641eadc0f90ebb33fdae2a4ce01a7e424fc69d50e86f5cce77
-
SSDEEP
3072:4D5iHYTFUVJthlZ+/vhu5hOfHByy0H3pAmBsw29d6rLrLedX28ids7Q+BmaSfu48:J4TFPvByyTmOH/l28iKlgvfuQEj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 VSURUSH.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 cmd.exe 2804 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\system\VSURUSH.exe 6addcb901f0f13cdd57f54936d098840N.exe File opened for modification C:\windows\system\VSURUSH.exe 6addcb901f0f13cdd57f54936d098840N.exe File created C:\windows\system\VSURUSH.exe.bat 6addcb901f0f13cdd57f54936d098840N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2200 6addcb901f0f13cdd57f54936d098840N.exe 2200 6addcb901f0f13cdd57f54936d098840N.exe 2756 VSURUSH.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2200 6addcb901f0f13cdd57f54936d098840N.exe 2200 6addcb901f0f13cdd57f54936d098840N.exe 2756 VSURUSH.exe 2756 VSURUSH.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2804 2200 6addcb901f0f13cdd57f54936d098840N.exe 30 PID 2200 wrote to memory of 2804 2200 6addcb901f0f13cdd57f54936d098840N.exe 30 PID 2200 wrote to memory of 2804 2200 6addcb901f0f13cdd57f54936d098840N.exe 30 PID 2200 wrote to memory of 2804 2200 6addcb901f0f13cdd57f54936d098840N.exe 30 PID 2804 wrote to memory of 2756 2804 cmd.exe 32 PID 2804 wrote to memory of 2756 2804 cmd.exe 32 PID 2804 wrote to memory of 2756 2804 cmd.exe 32 PID 2804 wrote to memory of 2756 2804 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6addcb901f0f13cdd57f54936d098840N.exe"C:\Users\Admin\AppData\Local\Temp\6addcb901f0f13cdd57f54936d098840N.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system\VSURUSH.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\windows\system\VSURUSH.exeC:\windows\system\VSURUSH.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD532e849ea59fd62ccea19041f2f867cfe
SHA1fdc01902f6d32fa2bb9a8ea08c610d2fdccb7711
SHA256eecd514d1ec644348f22e30d8884018632efe5857d714d86756880512f9806d8
SHA5126cfbf1b6ffd8d364a903d64847dda5ae0d1e869f853abcf9d27db26995506025d6942504826b9cc98433a4a1558213fc37874429cfd6e9e3e8cf639ee30ff3d3
-
Filesize
208KB
MD59dfecbe179eb2313677a3e21c2a4c5f8
SHA152db065da4253161f59fedadbd461181a48c5015
SHA256e432f5bfe0641accd80690bed9792786d34c5ecb5565ba98ea7162f15103f37f
SHA512c821e0651eea6f02db1cd21316c2667dab780c6fc09a1332b86cfbaac8ef1df1172c453a3f8472e2a78a5344ae0827bddee7157d877e56599ce3b4c2b5927ce2