Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
⌚/Copy_trydovoj.docx
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
⌚/Copy_trydovoj.docx
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
⌚/vvp_huilo.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
⌚/vvp_huilo.exe
Resource
win10v2004-20240709-en
General
-
Target
7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe
-
Size
2.1MB
-
MD5
d92740f07a25bb928abae9abe140169a
-
SHA1
c20671175e034bb2ac977ef1390d9bc7d3ea0d28
-
SHA256
7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605
-
SHA512
40036a391331bf9ee343aa96a4cd4f22598b2a7533440f8182ebfafcdc9d051f0def7d840800689490eac5d39b5fa20178dc7f870dddc4274f9a7c5bc817a9c5
-
SSDEEP
49152:DDcifOR181OrAdiiAojFrHLsPazEzHEOtkwTfljaRRsjHyTpo3U:D/8WO8diiXBrHL2a8HnTNjarsjHQv
Malware Config
Signatures
-
DarkTrack payload 1 IoCs
resource yara_rule behavioral1/memory/2640-35-0x0000000000400000-0x00000000024B3000-memory.dmp family_darktrack -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DriverBooster32.lnk 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 vvp_huilo.exe -
Loads dropped DLL 3 IoCs
pid Process 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvp_huilo.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1616 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 vvp_huilo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1616 WINWORD.EXE 1616 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1616 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 30 PID 1624 wrote to memory of 1616 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 30 PID 1624 wrote to memory of 1616 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 30 PID 1624 wrote to memory of 1616 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 30 PID 1624 wrote to memory of 2640 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 31 PID 1624 wrote to memory of 2640 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 31 PID 1624 wrote to memory of 2640 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 31 PID 1624 wrote to memory of 2640 1624 7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe 31 PID 1616 wrote to memory of 2816 1616 WINWORD.EXE 33 PID 1616 wrote to memory of 2816 1616 WINWORD.EXE 33 PID 1616 wrote to memory of 2816 1616 WINWORD.EXE 33 PID 1616 wrote to memory of 2816 1616 WINWORD.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe"C:\Users\Admin\AppData\Local\Temp\7e1c4d02e4dc294be0ffff2ebccbc4975713bc14984a904a0acf657ff422d605.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\Copy_trydovoj.docx"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2816
-
-
-
C:\Users\Admin\AppData\Roaming\vvp_huilo.exeC:\Users\Admin\AppData\Roaming\vvp_huilo.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5789497a9ff0bd7df99aa662f512c6856
SHA1f69cec1046f8e59983fd8cfcae867926495fadd6
SHA2568646226f4b2b2b96d5e31d4daae0ac5484edc2a7759297e0f63a06358ea61a38
SHA51271442dec98b3ec16f94ec07380087370c72a48532398f893a9324081f7560f7c620b549770b97356fe5400f6ef7e4935b6339d477298be13966c06f1f5065205
-
Filesize
379B
MD5a7686a91fbf425dc6df3d48c546c40d4
SHA13b97e834277ca99080a6c6e78e66735513a53546
SHA256800f3f2f70f6ec3225ab134f49c0778b02e502b46951223248b2e8fcc52b17a3
SHA512f87571ecdb0ab81eb312a9e419231aace0bfddc2e1d2cd71ca9e4e8a21c39b4867b2360be2329521fcbf48b556446bed672cdab90df95a7105e076737237f4bc
-
Filesize
19KB
MD54a9db58fe9e527922ed1cea2b207749b
SHA1a75e3ab52e3be600d0e0ddd2b32d18b510f0b689
SHA256275d1f15fc34df041c34ae1e9c0c3386e200986346b0e91eb9066e0dafcde61e
SHA51242c55b206a77c84e7850ebc2b4f37d0dbb6c67740dd0e463459c9b816c57751d54b89097960cabceb3b803886bb9a0c1c23cf243095bed4c152cc270dc0ac8a4
-
Filesize
623KB
MD52d3d077b9f62618ab75ee6dac00c7b25
SHA185ec19ebb93bbc417694b9631bcfc0c11fd8c704
SHA256b4564c85bf766afd5067294158521bbc92488041b1b7c363ee93420b463f7037
SHA5123d58debf4f798f619e53ed64e5c937f392759d34fcaf4e5d74dcdbccece026fbe0ad80d2386d54767a08b78e877bfaa4cdae79ec201763a41c1d07ed96c2301d