Analysis
-
max time kernel
41s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 00:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VlBBUwxYy.exe
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
VlBBUwxYy.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
VlBBUwxYy.exe
-
Size
5.6MB
-
MD5
8124ea8a72fc599dfe2a672dbaa458a3
-
SHA1
3e96b54608e40d37e77c252135fe11566228fdc4
-
SHA256
e10738a140545f3c5604d932e44ec6a3e310379ae99595add8b29c6fa5442bef
-
SHA512
2db2a58856fbc3b9594ef6628dc85a360ed068a55b395a1aa2b494c68d267d07c9450fbe3f67c408d9a57e75528d421961ec18ce704a13efbf6ad6db5aa0ed39
-
SSDEEP
98304:eW2nKiXBk1IIhLcIatIRksW/lby/PEJb+b1xU76wMxxyfKmt:p2KQOIE5aORlf3b1xU+jyfKm
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1508 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe 2964 VlBBUwxYy.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3228 2964 VlBBUwxYy.exe 92 PID 2964 wrote to memory of 3228 2964 VlBBUwxYy.exe 92 PID 3228 wrote to memory of 3668 3228 cmd.exe 93 PID 3228 wrote to memory of 3668 3228 cmd.exe 93 PID 3228 wrote to memory of 1808 3228 cmd.exe 94 PID 3228 wrote to memory of 1808 3228 cmd.exe 94 PID 3228 wrote to memory of 2536 3228 cmd.exe 95 PID 3228 wrote to memory of 2536 3228 cmd.exe 95 PID 2964 wrote to memory of 3604 2964 VlBBUwxYy.exe 97 PID 2964 wrote to memory of 3604 2964 VlBBUwxYy.exe 97 PID 2964 wrote to memory of 3604 2964 VlBBUwxYy.exe 110 PID 2964 wrote to memory of 3604 2964 VlBBUwxYy.exe 110 PID 3604 wrote to memory of 4528 3604 cmd.exe 111 PID 3604 wrote to memory of 4528 3604 cmd.exe 111 PID 4528 wrote to memory of 1508 4528 cmd.exe 116 PID 4528 wrote to memory of 1508 4528 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\VlBBUwxYy.exe"C:\Users\Admin\AppData\Local\Temp\VlBBUwxYy.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VlBBUwxYy.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VlBBUwxYy.exe" MD53⤵PID:3668
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1808
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Session not found. Use latest code. You can only have app opened 1 at a time. && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Session not found. Use latest code. You can only have app opened 1 at a time. && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:1508
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:81⤵PID:4844