Analysis
-
max time kernel
149s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe
Resource
win10v2004-20220901-en
General
-
Target
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe
-
Size
240KB
-
MD5
2ad57e6c403762e54c645f2a4f89dbd0
-
SHA1
0192de848197aa516cc4bc79f93bd56c14f35469
-
SHA256
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230
-
SHA512
1b85c6cb7279a89578ee91e73aec45963591fa7816eab92cf35e6eb849cfe0d1090f2480643437fcac27b01b945351e4aa441ba76fa5283827a13a2d6fc1908f
-
SSDEEP
3072:xkNaT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5cz7/:xl0UGKGkFRKfeoztO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vaoguak.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 vaoguak.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /t" vaoguak.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /c" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /s" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /w" 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /u" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /g" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /y" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /k" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /z" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /i" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /e" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /h" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /f" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /v" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /n" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /q" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /b" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /r" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /l" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /w" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /x" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /d" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /j" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /a" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /o" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /m" vaoguak.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vaoguak = "C:\\Users\\Admin\\vaoguak.exe /p" vaoguak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe 1720 vaoguak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 1720 vaoguak.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1720 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 27 PID 1408 wrote to memory of 1720 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 27 PID 1408 wrote to memory of 1720 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 27 PID 1408 wrote to memory of 1720 1408 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe"C:\Users\Admin\AppData\Local\Temp\7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\vaoguak.exe"C:\Users\Admin\vaoguak.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD52daacea733bac49982dd11c6925a0134
SHA1d657e718e19c2c3f3bce61cc0cd4bb9e931cf0b3
SHA256daa7d9aa10fd1696c79f7441092529c2af36bc86eb8dbd9c1a8c7d4caadfaae0
SHA512964e8303119f2cf9f79ce7b14f4c4e85219da1dbc5f1c992d795803e2f9a627f2281dd417c98ceff0710241802c972aaf696eca0800fa90fefb297baa748693b
-
Filesize
240KB
MD52daacea733bac49982dd11c6925a0134
SHA1d657e718e19c2c3f3bce61cc0cd4bb9e931cf0b3
SHA256daa7d9aa10fd1696c79f7441092529c2af36bc86eb8dbd9c1a8c7d4caadfaae0
SHA512964e8303119f2cf9f79ce7b14f4c4e85219da1dbc5f1c992d795803e2f9a627f2281dd417c98ceff0710241802c972aaf696eca0800fa90fefb297baa748693b
-
Filesize
240KB
MD52daacea733bac49982dd11c6925a0134
SHA1d657e718e19c2c3f3bce61cc0cd4bb9e931cf0b3
SHA256daa7d9aa10fd1696c79f7441092529c2af36bc86eb8dbd9c1a8c7d4caadfaae0
SHA512964e8303119f2cf9f79ce7b14f4c4e85219da1dbc5f1c992d795803e2f9a627f2281dd417c98ceff0710241802c972aaf696eca0800fa90fefb297baa748693b
-
Filesize
240KB
MD52daacea733bac49982dd11c6925a0134
SHA1d657e718e19c2c3f3bce61cc0cd4bb9e931cf0b3
SHA256daa7d9aa10fd1696c79f7441092529c2af36bc86eb8dbd9c1a8c7d4caadfaae0
SHA512964e8303119f2cf9f79ce7b14f4c4e85219da1dbc5f1c992d795803e2f9a627f2281dd417c98ceff0710241802c972aaf696eca0800fa90fefb297baa748693b