Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 04:00

General

  • Target

    Mechvibes.exe

  • Size

    95.3MB

  • MD5

    52dcd08a6dd8231427585bbdf933c836

  • SHA1

    2e2a08e1c162a1206a1baae6ba998bad07ca24c6

  • SHA256

    269fa9d2aa1d126ffe5bb592c27fff9d5ca89816445ecde01c9a2d1deb199734

  • SHA512

    fdd690bd9efb7e2c62da18ab7f446556634d89240d93ada371609b15b9a2da7dc697641ef17e8972f993a4149876bb0984f715396c508ad8afd9cb8b23c09906

  • SSDEEP

    1572864:mxbuVoAiIAhnzjGfG3RTLQt90hXgFSWqx/:2plI/4gMX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe
    "C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe
      "C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe" --type=gpu-process --field-trial-handle=1796,7203671115739980942,10272303479653518444,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --gpu-preferences=IAAAAAAAAADgAAAgAAAAAAAAYAAAAAAACAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAABQAAABAAAAAAAAAAAAAAAAYAAAAQAAAAAAAAAAEAAAAFAAAAEAAAAAAAAAABAAAABgAAAA== --service-request-channel-token=14807217088803434100 --mojo-platform-channel-handle=1808 --ignored=" --type=renderer " /prefetch:2
      2⤵
        PID:3692
      • C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe
        "C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe" --type=renderer --autoplay-policy=no-user-gesture-required --field-trial-handle=1796,7203671115739980942,10272303479653518444,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\src\app.js" --background-color=#fff --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --service-request-channel-token=4050098726134516696 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2336 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe
        "C:\Users\Admin\AppData\Local\Temp\Mechvibes.exe" --type=gpu-process --field-trial-handle=1796,7203671115739980942,10272303479653518444,131072 --disable-features=LayoutNG,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=IAAAAAAAAADgAAAgAAAAAAAAYAAAAAAACAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAABQAAABAAAAAAAAAAAAAAAAYAAAAQAAAAAAAAAAEAAAAFAAAAEAAAAAAAAAABAAAABgAAAA== --service-request-channel-token=17807465090904256083 --mojo-platform-channel-handle=3452 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4176
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:4604
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x4ac 0x50c
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Mechvibes\1864cac9-4795-4cc5-8efd-3231f6ade73f.tmp

        Filesize

        160B

        MD5

        918d8a47c337b71516ff56de3b0ec306

        SHA1

        a5fa7a891440e6c5115f447f1809f8c1703dad13

        SHA256

        0e96ee778046578f90bdd722f36eb4c578a50e916d5f2fc63149aec743914fe6

        SHA512

        a3433d0be715c206e8328591720cf2f168bb12012c4d014eaeb13d22da9d38f3119cb2adb5db0839bef18f011bbe8af35f87770a16458d156ce2c4908701da19

      • C:\Users\Admin\AppData\Roaming\Mechvibes\Network Persistent State~RFe59259f.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • memory/3692-2-0x00007FFB41D80000-0x00007FFB41D81000-memory.dmp

        Filesize

        4KB

      • memory/3692-32-0x0000019AD95A0000-0x0000019AD963E000-memory.dmp

        Filesize

        632KB

      • memory/3692-59-0x0000019AD95A0000-0x0000019AD963E000-memory.dmp

        Filesize

        632KB