Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
9e4904f3254b61e2846de012c3098950N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9e4904f3254b61e2846de012c3098950N.exe
Resource
win10v2004-20240709-en
General
-
Target
9e4904f3254b61e2846de012c3098950N.exe
-
Size
134KB
-
MD5
9e4904f3254b61e2846de012c3098950
-
SHA1
d0f222b628953b8884b5c1b11a80caacfeb6d7ed
-
SHA256
716d25821990cbfb9c7c906961e9f9ac7c8549ceb1066f753ff8c13fa799e1f8
-
SHA512
235fdc5c839545284952319c6a7f371fc3fca32695cdd6777b4e7127975e5336c4f2bb8bac4609e45ecda91734985ef35cda829be1019ca771c10cf837528d6a
-
SSDEEP
1536:iPQc0IiI+7vAIIzuQ8Tr15WUkTdIOzq0ZDYnJvx/45YssAe8d2wNmlFIhF9Vt:MQc01zAf6QGkBIO20Z2vQYeo7Ihf3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dvm.exe Set value (int) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9e4904f3254b61e2846de012c3098950N.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 9e4904f3254b61e2846de012c3098950N.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation dvm.exe -
Executes dropped EXE 6 IoCs
pid Process 4404 dvm.exe 1532 dvm.exe 2164 dvm.exe 2964 winvsp.exe 4592 dvm.exe 1812 vspconsole.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmcsp = "c:\\windows\\system32\\wmcsp.exe" 9e4904f3254b61e2846de012c3098950N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winvsp = "c:\\windows\\system32\\winvsp.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmcsp = "c:\\windows\\system32\\wmcsp.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svcvsp = "c:\\windows\\system32\\svcvsp.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vspmem = "c:\\windows\\system32\\vspmem.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svcvsp = "c:\\windows\\system32\\svcvsp.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winvsp = "c:\\windows\\system32\\winvsp.exe" 9e4904f3254b61e2846de012c3098950N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vspmem = "c:\\windows\\system32\\vspmem.exe" 9e4904f3254b61e2846de012c3098950N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svcvsp = "c:\\windows\\system32\\svcvsp.exe" 9e4904f3254b61e2846de012c3098950N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vspmem = "c:\\windows\\system32\\vspmem.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winvsp = "c:\\windows\\system32\\winvsp.exe" dvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmcsp = "c:\\windows\\system32\\wmcsp.exe" dvm.exe -
Drops file in System32 directory 44 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\dvm.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\vspmng.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\winvsp.exe dvm.exe File opened for modification \??\c:\windows\system32\vspconsole.exe dvm.exe File opened for modification C:\Windows\system32\vspconsole.exe dvm.exe File created \??\c:\windows\system32\winvsp.exe dvm.exe File created \??\c:\windows\system32\vspmem.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\windows\system32\svcvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\vspconsole.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\vspmem.exe dvm.exe File opened for modification \??\c:\windows\system32\vspmng.exe dvm.exe File opened for modification \??\c:\windows\system32\winvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\RCXC1AE.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification C:\Windows\system32\wmcsp.exe dvm.exe File opened for modification \??\c:\windows\system32\RCXC16B.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\RCXC1C0.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification C:\Windows\system32\vspmem.exe dvm.exe File opened for modification \??\c:\windows\system32\winvsp.exe dvm.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\dvm.exe.log dvm.exe File created \??\c:\windows\system32\wmcsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\RCXC17C.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\wmcsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\svcvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\windows\system32\vspconsole.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\wmcsp.exe dvm.exe File created \??\c:\windows\system32\winvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\RCXC17D.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\RCXC18E.tmp 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\windows\system32\vspmng.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\wmcsp.exe dvm.exe File opened for modification C:\Windows\system32\svcvsp.exe dvm.exe File opened for modification \??\c:\windows\system32\vspmem.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\svcvsp.exe dvm.exe File opened for modification C:\Windows\system32\winvsp.exe dvm.exe File opened for modification C:\Windows\system32\dvm.exe dvm.exe File opened for modification C:\Windows\system32\vspmng.exe dvm.exe File opened for modification \??\c:\windows\system32\vspmem.exe dvm.exe File opened for modification \??\c:\windows\system32\vspconsole.exe dvm.exe File opened for modification \??\c:\windows\system32\dvm.exe dvm.exe File opened for modification \??\c:\windows\system32\RCXC1AF.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\system32\dvm.exe dvm.exe File opened for modification \??\c:\windows\system32\svcvsp.exe dvm.exe File opened for modification \??\c:\windows\system32\vspmng.exe dvm.exe File created \??\c:\windows\system32\dvm.exe 9e4904f3254b61e2846de012c3098950N.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification \??\c:\program files\winvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\program files\svcvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\vspmng.exe dvm.exe File opened for modification \??\c:\program files\vspmem.exe dvm.exe File opened for modification \??\c:\program files\vspconsole.exe dvm.exe File created \??\c:\program files\dvm.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\program files\vspmng.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\winvsp.exe dvm.exe File opened for modification \??\c:\program files\wmcsp.exe dvm.exe File opened for modification \??\c:\program files\dvm.exe dvm.exe File created \??\c:\program files\vspmem.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\program files\wmcsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\wmcsp.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\program files\vspconsole.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\vspconsole.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\vspmng.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\dvm.exe dvm.exe File opened for modification \??\c:\program files\vspmem.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\svcvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\svcvsp.exe dvm.exe File opened for modification \??\c:\program files\winvsp.exe dvm.exe File opened for modification \??\c:\program files\vspmem.exe dvm.exe File opened for modification \??\c:\program files\vspmng.exe dvm.exe File created \??\c:\program files\winvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\svcvsp.exe dvm.exe File opened for modification \??\c:\program files\dvm.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\program files\wmcsp.exe dvm.exe File opened for modification \??\c:\program files\vspconsole.exe dvm.exe -
Drops file in Windows directory 35 IoCs
description ioc Process File opened for modification \??\c:\windows\winvsp.exe dvm.exe File opened for modification \??\c:\windows\vspmng.exe dvm.exe File opened for modification \??\c:\windows\RCXC1D1.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\RCXC1E2.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\wmcsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\RCXC1E3.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\vspconsole.exe dvm.exe File opened for modification \??\c:\windows\dvm.exe dvm.exe File created \??\c:\windows\winvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\winvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\vspmem.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\windows\wmcsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\dvm.exe dvm.exe File created \??\c:\windows\svcvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\svcvsp.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\vspmem.exe dvm.exe File opened for modification \??\c:\windows\svcvsp.exe dvm.exe File opened for modification \??\c:\windows\vspconsole.exe dvm.exe File opened for modification \??\c:\windows\RCXC1F5.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\wmcsp.exe dvm.exe File created \??\c:\windows\vspmem.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\RCXC1E4.tmp 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\windows\dvm.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\dvm.exe 9e4904f3254b61e2846de012c3098950N.exe File created \??\c:\windows\vspmng.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\RCXC1D0.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\vspconsole.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\RCXC1F4.tmp 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\svcvsp.exe dvm.exe File created \??\c:\windows\vspconsole.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\vspmng.exe 9e4904f3254b61e2846de012c3098950N.exe File opened for modification \??\c:\windows\vspmem.exe dvm.exe File opened for modification \??\c:\windows\winvsp.exe dvm.exe File opened for modification \??\c:\windows\wmcsp.exe dvm.exe File opened for modification \??\c:\windows\vspmng.exe dvm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dvm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = "2" dvm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dvm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dvm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dvm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dvm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dvm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced dvm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2964 winvsp.exe 2964 winvsp.exe 1812 vspconsole.exe 1812 vspconsole.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4404 dvm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2964 winvsp.exe Token: SeDebugPrivilege 1812 vspconsole.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1504 3080 9e4904f3254b61e2846de012c3098950N.exe 84 PID 3080 wrote to memory of 1504 3080 9e4904f3254b61e2846de012c3098950N.exe 84 PID 3080 wrote to memory of 4404 3080 9e4904f3254b61e2846de012c3098950N.exe 85 PID 3080 wrote to memory of 4404 3080 9e4904f3254b61e2846de012c3098950N.exe 85 PID 1532 wrote to memory of 2164 1532 dvm.exe 90 PID 1532 wrote to memory of 2164 1532 dvm.exe 90 PID 1532 wrote to memory of 2964 1532 dvm.exe 91 PID 1532 wrote to memory of 2964 1532 dvm.exe 91 PID 4404 wrote to memory of 4592 4404 dvm.exe 93 PID 4404 wrote to memory of 4592 4404 dvm.exe 93 PID 4404 wrote to memory of 1812 4404 dvm.exe 94 PID 4404 wrote to memory of 1812 4404 dvm.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e4904f3254b61e2846de012c3098950N.exe"C:\Users\Admin\AppData\Local\Temp\9e4904f3254b61e2846de012c3098950N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\9e4904f3254b61e2846de012c3098950N.exe"C:\Users\Admin\AppData\Local\Temp\9e4904f3254b61e2846de012c3098950N.exe" rg2⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
PID:1504
-
-
C:\Users\Admin\Documents\dvm.exe"C:\Users\Admin\Documents\dvm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\Documents\dvm.exe"C:\Users\Admin\Documents\dvm.exe" rg3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
PID:4592
-
-
C:\Users\Admin\Documents\vspconsole.exe"C:\Users\Admin\Documents\vspconsole.exe" wm 44043⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Users\Admin\Documents\dvm.exe"C:\Users\Admin\Documents\dvm.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\Documents\dvm.exe"C:\Users\Admin\Documents\dvm.exe" rg2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2164
-
-
C:\windows\system32\winvsp.exe"C:\windows\system32\winvsp.exe" ws 1532 winvsp2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD507d4c0c3bd4031c325814063946ddfd9
SHA112c200bb85943ef2d3e602f8c6ee890c0d01aea5
SHA2564b49d4c40e59c8f82ae9a1bc6ed8c83b3df58167c4d2786650ef6323464ddf0a
SHA51216f6f6819208fbe09ffa51592f2da284b602c45b421eadd823c0214efe9273b656bd81d37cb4dd537e8a76b0ef63f7a86d971b370f0eb020bf8d11d811fa3c0e
-
Filesize
136KB
MD5dd7ecbdebd9ce3121f32a61c6e4a50fc
SHA1e8d1575a12918cd8fa58323d05dbdeace9a27a8c
SHA256bf16b141f188528549c0ef51778cf123c5643de475cc6f76989eca3e3cae70c4
SHA512bc9f69185f8bf77995d8347b42cea6ca531f299bd68a21739c1e636d033b58eac74ca56f8111c4f2f7dff100d07b65bfd69f9f3ce04eb10e3be6838b0f246843
-
Filesize
134KB
MD565a0cd616ea0f5928f123c7bff964e23
SHA1b663dd2a751eec7c9b69f55a47fcd670e2c8ba03
SHA256dcdb83db7fd2a0e17de6fcb2bbc90abb80f55b09fcd280cc1a54dea3c6d95ce0
SHA512fdbe891ffcef0a6018f071081465e524b64bcb72b9afcdd977b751fc712d90ff75cc6f2fd038849d317df5c0da9085d1f4e56ad9787a041f78b583afb1a74cd6
-
Filesize
115B
MD55f2253957958934a8b81921678832b72
SHA1d9b030f94a9f3323fdcdb391192960d840b89723
SHA256ab70783e426113082348a647ea0de73875931662f82b9f2ea4f3a44e5fac1000
SHA51228310f23b744a03f81707d7fb77a9f5fce621bcfc56108b9ff76bbdb4ebc6014380715fef68c8b3c486c9aa4bfc1e66928caa7294bea4d263a18ab8557a96460
-
Filesize
134KB
MD58c128fdb021798d913e685cb2a6a37dd
SHA19211b2ccea07c7688e69e0be4eadf5b83c76d4fd
SHA2561009e0f39eec98af2308bb9762804f332286a01917011cba0147696a984f02b2
SHA5121e3255b23163b50902068b53722e53ef96ffc620deb8211c77894fa7d248b6352b49558c13d8a5045393a34ccbdfc8bafdc4920d1cff2e16bd3734ebf0b41556
-
Filesize
134KB
MD59e4904f3254b61e2846de012c3098950
SHA1d0f222b628953b8884b5c1b11a80caacfeb6d7ed
SHA256716d25821990cbfb9c7c906961e9f9ac7c8549ceb1066f753ff8c13fa799e1f8
SHA512235fdc5c839545284952319c6a7f371fc3fca32695cdd6777b4e7127975e5336c4f2bb8bac4609e45ecda91734985ef35cda829be1019ca771c10cf837528d6a