Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe
Resource
win10v2004-20240802-en
General
-
Target
f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe
-
Size
33KB
-
MD5
8f8a07f7b1f3032537d74dea607e8ed6
-
SHA1
78fe1329a5b8a0fd8a4d9041ef1edae4a7d1f59f
-
SHA256
f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925
-
SHA512
bf659d8205865d9d746fc7459d0a65f16b3cc33f10b5b57bc98a2dc7c50158c7fe807c1c47e05c8ec0b81e34181d008b859118f88fd4b461c65fbd7ea3e79a1a
-
SSDEEP
768:GNmKD0N8ytZ6QLr5Xrya4EuiHj0jszFNRGBefznvLArYs:KXol/Lr5Xua4jiHj0jsJNRue7vLE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 Vpe.dll -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Vpe.dll f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2952 set thread context of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 PID 2952 set thread context of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 PID 2952 set thread context of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 PID 2952 set thread context of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vpe.dll -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 PID 2952 wrote to memory of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 PID 2952 wrote to memory of 2432 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 82 PID 2952 wrote to memory of 3532 2952 f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe"C:\Users\Admin\AppData\Local\Temp\f1dadad8dee0ec7e0118aa9c1bab801bee3115501e865e2dacf95b76e52c7925.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Vpe.dll"C:\Windows\system32\Vpe.dll"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a23a09987c3ce25f8038545717d9785c
SHA1d512f2b9e2be31840a1e1ab72994564d5619c5de
SHA25618488a4a0d371aa6f1ab0d19c66cbd6cabf0dcb8161889976466ff07f8a5392f
SHA5121a940195dad96f4a598d27ce3d2a27905ac46ee92c35a9081db42a37abbc4ea03dd64bdba628fe3013c4be9e23c644d863d9c52ff385432d24023ea32a56f3bf