Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/09/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
VIZPLOIT/VIZSPLOIT.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
VIZPLOIT/cheat.dll
Resource
win11-20240802-en
General
-
Target
VIZPLOIT/VIZSPLOIT.exe
-
Size
273KB
-
MD5
b327cefae6707c649804ba89518e9690
-
SHA1
0a9f7bd8b51d61288cf253a186693f38299bbfb5
-
SHA256
2a196a394b6f73d6e9dafe6205c6507802d50d21de2d715ff512c2c2e4b6531c
-
SHA512
670a1a0db9bcac41e3f0d16992a920232d22e69dbadecffc542990550557ec72f0d2100790fdda3c1645bee339f6a0ce79ae0a3fa5ef590eb882279c5dd815a8
-
SSDEEP
3072:MsC1JX9HSPBKYyuXu8Hzj5v5fOj/1tleVKCKxLD8O:fC/X9yPBFpu8TyxeVKdtD8
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 3 IoCs
pid Process 4668 gWsmPty.exe 5296 VC_redistx64.exe 2672 VIZSPLOIT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\ProgramData\\MyHiddenFolder\\VC_redistx64.exe" VC_redistx64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIZSPLOIT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redistx64.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 3652 VIZSPLOIT.exe 4668 gWsmPty.exe 5296 VC_redistx64.exe 5296 VC_redistx64.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3652 VIZSPLOIT.exe Token: SeBackupPrivilege 4668 gWsmPty.exe Token: SeSecurityPrivilege 4668 gWsmPty.exe Token: SeSecurityPrivilege 4668 gWsmPty.exe Token: SeSecurityPrivilege 4668 gWsmPty.exe Token: SeSecurityPrivilege 4668 gWsmPty.exe Token: SeDebugPrivilege 4668 gWsmPty.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3652 wrote to memory of 4668 3652 VIZSPLOIT.exe 81 PID 3652 wrote to memory of 4668 3652 VIZSPLOIT.exe 81 PID 3652 wrote to memory of 5296 3652 VIZSPLOIT.exe 82 PID 3652 wrote to memory of 5296 3652 VIZSPLOIT.exe 82 PID 3652 wrote to memory of 5296 3652 VIZSPLOIT.exe 82 PID 3652 wrote to memory of 2672 3652 VIZSPLOIT.exe 83 PID 3652 wrote to memory of 2672 3652 VIZSPLOIT.exe 83 PID 2672 wrote to memory of 1576 2672 VIZSPLOIT.exe 85 PID 2672 wrote to memory of 1576 2672 VIZSPLOIT.exe 85 PID 1576 wrote to memory of 3020 1576 cmd.exe 86 PID 1576 wrote to memory of 3020 1576 cmd.exe 86 PID 2672 wrote to memory of 1380 2672 VIZSPLOIT.exe 87 PID 2672 wrote to memory of 1380 2672 VIZSPLOIT.exe 87 PID 1380 wrote to memory of 1828 1380 cmd.exe 88 PID 1380 wrote to memory of 1828 1380 cmd.exe 88 PID 2672 wrote to memory of 5624 2672 VIZSPLOIT.exe 89 PID 2672 wrote to memory of 5624 2672 VIZSPLOIT.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\VIZPLOIT\VIZSPLOIT.exe"C:\Users\Admin\AppData\Local\Temp\VIZPLOIT\VIZSPLOIT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Roaming\gWsmPty.exe"C:\Users\Admin\AppData\Roaming\gWsmPty.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
C:\Users\Admin\AppData\Roaming\VIZSPLOIT.exe"C:\Users\Admin\AppData\Roaming\VIZSPLOIT.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con cols=853⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\mode.commode con cols=854⤵PID:3020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con lines=253⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\mode.commode con lines=254⤵PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c TITLE Visploit3⤵PID:5624
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD53c5a28fab0ef1744fbe9313bb9038d30
SHA135666d73062f42cd140b4b32c271a52019b894c7
SHA256537e022a4717d763a3b927c44d1255ac83abe8018cd4f00ad1434e5bb921ebe9
SHA5129fcd5255d56554dfcb655ec7322356f0146a707ab72a9324defc074e327811e776f361b88f97ddcc3d443059a4bdc67a936e4a90d630723998493bf7502aa33a
-
Filesize
194KB
MD51f29ee3673fc717fcb8f6007c3f840cd
SHA15efd71aa728a1699a890e7acbff5f38402b56b4e
SHA2565d8159897acac6a7349dad41208004e071e0ad0388142d81bb4cc72ef459a500
SHA512c1b79a9edfbf8ef9536c28131a9a800cc911ccfb4a7504675566ce9e9bde69965fa4c7e04902f206dfa63c1bb58071809939c8ca3f8ae5adca79ee7d59cab4c3
-
Filesize
419KB
MD5a90b649cc651b59ee02dad3ab6be1817
SHA1c15484cfd80387c9d07d8873747d282a28aa5587
SHA256375fddff8aca7bfc7076751647bb9f1e5f6dd63cc3a74623c78a78a0fd4f8cc9
SHA5121055b08e1202b85179d271fe393db4c939be855ceeee4b1dc13ad754b33e3736f23655ffe9b5314873c799b50ddf79ac537c505decebe328e2a3fd32da9e069e