Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 08:34
Static task
static1
Behavioral task
behavioral1
Sample
ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
Resource
win10v2004-20241007-en
General
-
Target
ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
-
Size
78KB
-
MD5
74921ae1ff9ebcf44aad3fe2ce87acca
-
SHA1
26283b9057972692c0121590b7d3621f114a4daa
-
SHA256
ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d
-
SHA512
8fc866e869f5adad91fda66e4f8779eb2cd0caf52085eccc8e358b40aadb3df54913fb05d0e6506ad12d768886f92afa85224ecc78c6c33c6e792adf7f53b3c6
-
SSDEEP
1536:Qmy58QvZv0kH9gDDtWzYCnJPeoYrGQtC67Q9/o1x0w:vy58Ql0Y9MDYrm7jQ9/rw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 tmpA5D.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 tmpA5D.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpA5D.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA5D.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe Token: SeDebugPrivilege 2820 tmpA5D.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2888 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 30 PID 1596 wrote to memory of 2888 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 30 PID 1596 wrote to memory of 2888 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 30 PID 1596 wrote to memory of 2888 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 30 PID 2888 wrote to memory of 2900 2888 vbc.exe 32 PID 2888 wrote to memory of 2900 2888 vbc.exe 32 PID 2888 wrote to memory of 2900 2888 vbc.exe 32 PID 2888 wrote to memory of 2900 2888 vbc.exe 32 PID 1596 wrote to memory of 2820 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 33 PID 1596 wrote to memory of 2820 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 33 PID 1596 wrote to memory of 2820 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 33 PID 1596 wrote to memory of 2820 1596 ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe"C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\y1f2th6h.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB48.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB47.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA5D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA5D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5259a3f5c8f074a0e068e0533eeec20aa
SHA156fcbeac023cbc78ef51a7f518c29d38969b0aaf
SHA25606495cdbcc20bfd21d042e9911d714e2a44452bceb01418d5cb963043ad0eda7
SHA512b33fad0672d3fbb3533c5e913de7af6014b3463b098bd1bd328f0a0f41b3b60775f69099f5da5dd9c9e4b10e017faf27339b8afed9c12828eebea0b55ed64232
-
Filesize
78KB
MD5561545b1a3843e8b38de5f7cc52402ed
SHA144d67efd67525b9bd11e7decc3f16fa4b960dad0
SHA256d6b6adaf946bce93a1a740e15e2fd8632b3246dc7a1c15b687a0eac180e7f300
SHA512bc3496bc00e2451885f45b010928d4eda1f6a5b0b6b34d93e498e5a0113eb27fd263245df5bef7eb19f801ed64df70d309ce1b8c53becf4f3a7f31bd2d543e7a
-
Filesize
660B
MD56f3ed39d0c9881dc0facb431f2568e41
SHA1385383b226ac1677f3f48c73a769d445e3f6ac68
SHA256bf73dad5717867b6a6af9136fcd01e854213c5614a648a84b2d0d673472fc233
SHA512f994843dc072357de240ceadfc1d119a2d203ee25262316bb0852e020b6b95f0da9d6985d109c207168411872b782d1af04a616f496a0fef9cac1f6e5ddd743d
-
Filesize
14KB
MD5d84007b044fe423e560c4fea030919c6
SHA1c6f8f0f34fda4088dd822eda9ba075e7e66d8540
SHA2568aa05421d4906efa585b4202e9860b7e21b29fda7615e6ffcb77c736381a8299
SHA5127b4c8adbb2b13a1fd6460b6653f2f59060fc699b98d81dc338ed3733a8440a5041e17f44781644eb8a62152299e8d30eefe2fd3a0a7dd5aac0d4b759f1bc395f
-
Filesize
265B
MD57be96f46bbfebe23867e6741c2ebbb99
SHA1df857e98b880774bf0a45afe4c2dc748a2a9c040
SHA256cc7f126c6ed239de9cbb520d2052cc0f35ad28a8f3da79d4ead5951229670078
SHA512ed6aa34cc5547ca3841df91cb1f886b0bf0f12a6f2432687fe7a48b49e45c0ed1887b2157342dccd97cf36fcaa3de2828e09c3950d49636c30d9ccf5784a124c
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d