Analysis
-
max time kernel
170s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:32
Static task
static1
Behavioral task
behavioral1
Sample
c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe
Resource
win10v2004-20220812-en
General
-
Target
c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe
-
Size
1.1MB
-
MD5
2652dd783aca1063b48176abc46485a2
-
SHA1
91b32e8e40d49567d1709409af27d6121de005dd
-
SHA256
c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380
-
SHA512
aedd332ec11e36f8978bd1bd3b482b5d552310be41a4e6673fd9499dbd6184808eb3573105feef0559dfec07f26a2e284c98b40c6cba83b4b87bd7287d45ea0b
-
SSDEEP
24576:HaIo2sd8FMl5nzxVHZ+usYzNuZN+dPU+9Q0xURu:Hbogin9SKs+9+Ru
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 VioDrv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run VioDrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VioDrv = "C:\\Windows\\VioDrv.exe" VioDrv.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\VioDrv.dat VioDrv.exe File opened for modification C:\Windows\VioDrv.dat VioDrv.exe File created C:\Windows\VioDrv.exe c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1704 1904 c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe 27 PID 1904 wrote to memory of 1704 1904 c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe 27 PID 1904 wrote to memory of 1704 1904 c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe 27 PID 1904 wrote to memory of 1704 1904 c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe"C:\Users\Admin\AppData\Local\Temp\c0bbba0b65a003daa414c9ed9d07ecc853446223c7f8fe72bb6b7bcbe8018380.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\VioDrv.exe"C:\Windows\VioDrv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD57db18ce102a94fc1dcec80f01542b413
SHA1d0ce65e2031c198a62ba68a05c4bafeee7ba7f0c
SHA2567f51c43a4ab8c95ceea6011f8fa6ae6df9529ec08d4344430c323815a57ef4bb
SHA51201f3c26784e2603fa1443f18539a75ed177a5868554b0fb43d027764ab3078cb77457b54008102e052c1bd419b7df9e2a2ad73c69a4eacf2e4b26da53d33e240