Resubmissions

22-07-2021 22:17

210722-vrwe53ajen 10

22-07-2021 22:11

210722-wg9q4s96hs 10

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-07-2021 22:11

General

  • Target

    _vcofsoig.nfn.exe

  • Size

    2.1MB

  • MD5

    2c6fa0b31d84f67377ddd6ea2799b752

  • SHA1

    cf0b9d9c65829009eba7c1a5845be69be5e2e837

  • SHA256

    1c5c3a3fa4fdd0ea52166d9a924fac13883e5c5797b9acd89dace63e1a468f6f

  • SHA512

    9beaa08110453de703105a17cf6237f099b069bfd913381af334b8f61f8f69c16648f84afe3852a361a934563a27178389a1077ede1a267312394c483d941ce6

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\_vcofsoig.nfn.exe
    "C:\Users\Admin\AppData\Local\Temp\_vcofsoig.nfn.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1756

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1756-60-0x000007FEFBD21000-0x000007FEFBD23000-memory.dmp
    Filesize

    8KB

  • memory/1756-61-0x0000000000460000-0x0000000000461000-memory.dmp
    Filesize

    4KB