Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 09:12

General

  • Target

    VFmanager.exe

  • Size

    960KB

  • MD5

    fb5e491f6d4567717dead087e32b5715

  • SHA1

    e0b62ad5e1480384ff8efeb1e1464d49e5f4eda3

  • SHA256

    4418f006823d08682ad2ea3c836bf3ce08c600d83bed877e46bfa3ad4611cbd3

  • SHA512

    0108c461b940948c1cee5ecea994e305cbc3be828a6f992d606cb3997d2089bae87d2af646169c0388aa61d6cc25789f28bc5844a1c36a0305fbba53ba12c6f2

  • SSDEEP

    12288:iQ4hd/ohdiZMSYtxDyO0cLTws5q67MbboiyxBrsNtrbX/hioHc3aR+ZHGGf6J2Q1:i1DglSYWcHwdccbxywLJ6VRr65oS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VFmanager.exe
    "C:\Users\Admin\AppData\Local\Temp\VFmanager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ϵͳ²ÎÊý.INI

    Filesize

    62B

    MD5

    568b3fadd0d2b3b7cae4b8932ce2d89a

    SHA1

    eddc39c95bef67d200002119605702e9d3305756

    SHA256

    fae0e2fc06986bafa480803cd4e7f9a68ede662627d64d8dd0fafc37770defc2

    SHA512

    a8c6440e2a393f15bd39e0211ee3b4144c35fbcb751eff51e2743df42533b4b02a5ce79de3ab5396f75d6e7b10740e23d856373c1a95d768ef0bd4b491153f21

  • memory/2396-0-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/2396-7-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/2396-8-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB