Analysis
-
max time kernel
168s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe
Resource
win10v2004-20220812-en
General
-
Target
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe
-
Size
312KB
-
MD5
46e30c8e93a936140c3c543aba3f9e71
-
SHA1
813ab8fa8ea3d9a9669bb318a6fd87534c175d4f
-
SHA256
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16
-
SHA512
c27e99b4dbaf6110ecf4edf068561e3702b943d90a994e67326a9f1c7fbdd533d883e1091926f2b97203c907b9c62c9129bf73fdf5f3eef41369e43179f52cb2
-
SSDEEP
6144:4Abc0f7XP+g3AGJpWVzugs7PRHeEgRK/fObT/bGiJKv6R7MkZ4lUr8W9HuOGKqvs:zw27/XvLWpu/eEgRK/fObT/bGiJlMkZ9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vrsuif.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 vrsuif.exe -
Loads dropped DLL 2 IoCs
pid Process 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /m" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /S" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /q" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /J" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /R" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /x" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /E" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /t" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /L" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /A" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /r" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /Y" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /W" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /e" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /o" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /C" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /O" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /s" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /l" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /b" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /y" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /K" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /j" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /n" vrsuif.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /V" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /k" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /p" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /g" vrsuif.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /H" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /h" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /d" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /u" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /C" 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /P" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /a" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /z" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /w" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /f" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /M" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /X" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /c" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /D" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /N" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /v" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /T" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /G" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /U" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /Q" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /i" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /F" vrsuif.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrsuif = "C:\\Users\\Admin\\vrsuif.exe /Z" vrsuif.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe 1684 vrsuif.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 1684 vrsuif.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1684 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 26 PID 1524 wrote to memory of 1684 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 26 PID 1524 wrote to memory of 1684 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 26 PID 1524 wrote to memory of 1684 1524 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe"C:\Users\Admin\AppData\Local\Temp\7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\vrsuif.exe"C:\Users\Admin\vrsuif.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD566bdd661c0ff103b2567c91d621f2c34
SHA14bb93b53c99b5b698dbb6d3acb337bcb0917a4d8
SHA25670ea59eea0cb01bea59ccb9cbf671fa2e1cda1ec45a1eeefeb73582ef12ee935
SHA512b6dff5b03334e23e0afb1876679604f271c4eb2bdbcf5b5162b11ba7cb810fbe2a288a97bf184cbb552919e8c5daec4ef0fdbf147cf46a7ac79a12a90da964d2
-
Filesize
312KB
MD566bdd661c0ff103b2567c91d621f2c34
SHA14bb93b53c99b5b698dbb6d3acb337bcb0917a4d8
SHA25670ea59eea0cb01bea59ccb9cbf671fa2e1cda1ec45a1eeefeb73582ef12ee935
SHA512b6dff5b03334e23e0afb1876679604f271c4eb2bdbcf5b5162b11ba7cb810fbe2a288a97bf184cbb552919e8c5daec4ef0fdbf147cf46a7ac79a12a90da964d2
-
Filesize
312KB
MD566bdd661c0ff103b2567c91d621f2c34
SHA14bb93b53c99b5b698dbb6d3acb337bcb0917a4d8
SHA25670ea59eea0cb01bea59ccb9cbf671fa2e1cda1ec45a1eeefeb73582ef12ee935
SHA512b6dff5b03334e23e0afb1876679604f271c4eb2bdbcf5b5162b11ba7cb810fbe2a288a97bf184cbb552919e8c5daec4ef0fdbf147cf46a7ac79a12a90da964d2
-
Filesize
312KB
MD566bdd661c0ff103b2567c91d621f2c34
SHA14bb93b53c99b5b698dbb6d3acb337bcb0917a4d8
SHA25670ea59eea0cb01bea59ccb9cbf671fa2e1cda1ec45a1eeefeb73582ef12ee935
SHA512b6dff5b03334e23e0afb1876679604f271c4eb2bdbcf5b5162b11ba7cb810fbe2a288a97bf184cbb552919e8c5daec4ef0fdbf147cf46a7ac79a12a90da964d2