Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 19:11
Behavioral task
behavioral1
Sample
0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe
Resource
win10v2004-20240802-en
General
-
Target
0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe
-
Size
17KB
-
MD5
0b660bffa6e0093bf7054a8d80071585
-
SHA1
6450139c6698b3cfb67cf9f06a0b3190c44442af
-
SHA256
0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15
-
SHA512
09fb8bbe5d013fa01ba5cd50595a2d273411a71344ba3e9af7864dbad185c88844c128b023f85368c1718c05e9799f46d2af11dc0665c14c4c30dfd161537f48
-
SSDEEP
384:pxkgrwjFTcBr6YbalEM7s/oObysVKQsyKXfWc:pxkgrwFwvalEoGChXu
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3352 0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3352 wrote to memory of 1456 3352 0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe 91 PID 3352 wrote to memory of 1456 3352 0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe 91 PID 1456 wrote to memory of 1100 1456 vbc.exe 93 PID 1456 wrote to memory of 1100 1456 vbc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe"C:\Users\Admin\AppData\Local\Temp\0f9f2ed3669af8502dfad754d0dc2e7682fe7bc4d0044f7cc3ca61a0e1170d15.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\utgalyu7.cmdline"2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2D16.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6E2F094937364DA29B9DECA6A55A0A5.TMP"3⤵PID:1100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ee0fe2722fe76517734aa2fc12a40a5
SHA1bf53ac9b4d4c99b1537eea3f9897bc9fcc8cf7e3
SHA256b000021f2d5d35e3efb2a95690e19a91c9428200d58b62bc7fd76584ff628f23
SHA512127e06efe6df5b66e6ad70c52ec771f21d148a080adb12b5fe7b5b9ff5a35f37aa0c3d30d7f8fca0de49f138ef6957faa336cb464116f57def0f638b472d6de3
-
Filesize
212B
MD58535e84314fe151d979f9896e28a33d7
SHA15cb5609f42179f838b87d61eb210210b91e5b83a
SHA25625ba1e85cfd057b879b7b8d05d983799d2f7cade11e0d447614462e5921eb99b
SHA51224902ef8cdef9b8feb9d060e72f6a45f66da7c43c39cb627794de6405bcee2a592e889aadfa20b46e0a54291b682c0b67bd6ae3b15f8283d9c768800af0418bc
-
Filesize
194B
MD5bd44573f0f08a3a19b59ed29a4f79377
SHA11a9a8bb9d03685f159883e700ac9d3ee719c46b9
SHA2561d339b828702006f76a49cc2b60d75b39b1d416b3491cb10fc22786ac1ff44ba
SHA5121469ae559293c1b1ba3b6c4d325e0a525360c0e62da5be2aab62f5ce69c9b78e9cc76edc70154f3d7eeebb5f7384f87ae523c6f7eec7c4d37f014ba6a907bed1
-
Filesize
644B
MD523c5f6c5bb4e5de59ec5aa884ea098d3
SHA17240ba716de1d9ddaa3f9e3a0adcd7e00c4e6a83
SHA2567e090465b6d810c988f61a89f11debded56b4bff54c07369c26ab8afd9e8ba27
SHA512bef35b5af9bb58041f3783a43e85f204a088f44e19168815eea881c2864f9c9038f0e8ba2ab136b6514028e6c22652496cee61fe6dab467b56f0a31809ca1f51