Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 03:03

General

  • Target

    227ad5a386d2e09e2d24d5bde2025eca7d2eaa232540da3a26829149aeb82ce5.exe

  • Size

    260KB

  • MD5

    4c3562c2a374248c5911903389304a30

  • SHA1

    e0c6d539c710a2e74d0838877008db83a6b82884

  • SHA256

    227ad5a386d2e09e2d24d5bde2025eca7d2eaa232540da3a26829149aeb82ce5

  • SHA512

    7f4297e4c1ae339ff7d4b86a5caf135248a0754c03e48c13e35164e030f8839718ebf859bb434f9963e930a1674bcb58baf76b0ebc99092c1c13378b46f38008

  • SSDEEP

    6144:WdbtGgTSrMaIl/jcLijfHFEHWzXvjT85R:WrTSrMaIqLlI/H85R

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\227ad5a386d2e09e2d24d5bde2025eca7d2eaa232540da3a26829149aeb82ce5.exe
    "C:\Users\Admin\AppData\Local\Temp\227ad5a386d2e09e2d24d5bde2025eca7d2eaa232540da3a26829149aeb82ce5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Users\Admin\veqov.exe
      "C:\Users\Admin\veqov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4856

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\veqov.exe
    Filesize

    260KB

    MD5

    dfe87cad8b4575d2c0cc8b70f89ad7b9

    SHA1

    5ea84d1e500def50d22bffc1b272b3b9bb8d6c5c

    SHA256

    79be62cac9920682d034d226a3be9e89c5e1d742d05e09de3bc7f2caae9a7faa

    SHA512

    732989e2bb719f4472f4e210426d4ef21f7de4f93c8b813487a0416cb851e7425920063418468c1e8e9a86054f11c9340062e7636ef49226848cb83cb4281d33

  • C:\Users\Admin\veqov.exe
    Filesize

    260KB

    MD5

    dfe87cad8b4575d2c0cc8b70f89ad7b9

    SHA1

    5ea84d1e500def50d22bffc1b272b3b9bb8d6c5c

    SHA256

    79be62cac9920682d034d226a3be9e89c5e1d742d05e09de3bc7f2caae9a7faa

    SHA512

    732989e2bb719f4472f4e210426d4ef21f7de4f93c8b813487a0416cb851e7425920063418468c1e8e9a86054f11c9340062e7636ef49226848cb83cb4281d33

  • memory/4856-134-0x0000000000000000-mapping.dmp