Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 18:05

General

  • Target

    VCDS.exe

  • Size

    2.3MB

  • MD5

    9644e0c548de043263196f7c8b05443e

  • SHA1

    2373d58368d2e35986a1ee9d2e69c532c2e5dbda

  • SHA256

    b26ec38e4d15bb45a1b523840dd463f69c84e37489af1d949a79374c4d96089f

  • SHA512

    fd1f5494324a7682690fb687516a107ba42e6a74ba516c1b6e2984db642486933eff73ad49c89e09cacc57266f7ad8a249806097d485ec159f64483ed730f786

  • SSDEEP

    49152:C1wyLkdMuON1e7uC30JH2hj5y6GSpTksWmE7x5Zt:C1wpNOPEkJWd5yDSpogEPZt

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VCDS.exe
    "C:\Users\Admin\AppData\Local\Temp\VCDS.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3743a152297e2b0a0a122d6e2ecd530a

    SHA1

    0ed09d006fb641392065618c6c0e1e950fcf287c

    SHA256

    5afd32db2553173bc194cf1eaa81beb077a8db786924d3218c5b0f5c3aa317b1

    SHA512

    675846e1b5ce51ff70e9b491822fb5a4a50a5ed9adb4084d3726f8bbfe53074752bb72ee6faa7033181b097459c06904e1b7c3cb83dfc7cae66a05bdfd466981

  • C:\Users\Admin\AppData\Local\Temp\Tar58A2.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1932-73-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-69-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-70-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-71-0x000000007EBD0000-0x000000007EFA1000-memory.dmp
    Filesize

    3.8MB

  • memory/1932-72-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-0-0x000000007EBD0000-0x000000007EFA1000-memory.dmp
    Filesize

    3.8MB

  • memory/1932-74-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-75-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-76-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-77-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-78-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-79-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-80-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-81-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-82-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB

  • memory/1932-83-0x0000000000400000-0x0000000004E8E000-memory.dmp
    Filesize

    74.6MB