Analysis
-
max time kernel
167s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 20:43
Static task
static1
Behavioral task
behavioral1
Sample
f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe
Resource
win10v2004-20220812-en
General
-
Target
f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe
-
Size
288KB
-
MD5
68e08bfd1704d0bc4ff8ff85953f5a40
-
SHA1
195cac3111a1c6a2e99305f72381ba17c8d1ff69
-
SHA256
f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4
-
SHA512
3077ef4e114f9934b16185c9110cf3aab68364e74dcb081775052efbd371d10c22ec4ee59d15a4b8bc96eadadac2bd29f49be6e9d9c6c2a0ab472a43f8857583
-
SSDEEP
6144:NUigIAN+tytpx96Hg02BCh3FZuhbYaxUG2nIVeUutl:NUigIfyDxsHg02BCh3FZuhbYaxUG2npN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viuuliw.exe -
Executes dropped EXE 1 IoCs
pid Process 4748 viuuliw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /h" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /s" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /Y" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /f" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /g" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /E" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /a" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /x" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /Q" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /t" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /N" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /D" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /v" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /q" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /w" viuuliw.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /C" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /A" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /T" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /e" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /S" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /G" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /j" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /b" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /o" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /V" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /u" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /J" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /l" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /X" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /p" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /n" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /U" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /k" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /F" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /I" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /L" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /K" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /d" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /W" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /Z" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /o" f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /c" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /i" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /z" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /R" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /M" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /H" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /O" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /P" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /r" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /B" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /m" viuuliw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuuliw = "C:\\Users\\Admin\\viuuliw.exe /y" viuuliw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4868 f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe 4868 f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe 4748 viuuliw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4868 f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe 4748 viuuliw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4748 4868 f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe 80 PID 4868 wrote to memory of 4748 4868 f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe 80 PID 4868 wrote to memory of 4748 4868 f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe"C:\Users\Admin\AppData\Local\Temp\f019e250983ab9366e73322fcd2735aa234d388f9e3923b7fe3b5709c7c9f2f4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\viuuliw.exe"C:\Users\Admin\viuuliw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD55b8898d5a0576813f37d4f054d016410
SHA1184582fc9dd396fc9c8810a1c591ffb4206c8ddb
SHA2562a36a6c931b05b99be2249c6df6e1f7a155244079d9aaa26b24675a05357abbf
SHA512f72a44b7025c5c93f913a92966e797da60530e1cf95618f9e4bb21496a8796bdf5b2c2607442f899521bf5ac28bea88d4ed23fc71f423a61c68b5ed9b2d8d15d
-
Filesize
288KB
MD55b8898d5a0576813f37d4f054d016410
SHA1184582fc9dd396fc9c8810a1c591ffb4206c8ddb
SHA2562a36a6c931b05b99be2249c6df6e1f7a155244079d9aaa26b24675a05357abbf
SHA512f72a44b7025c5c93f913a92966e797da60530e1cf95618f9e4bb21496a8796bdf5b2c2607442f899521bf5ac28bea88d4ed23fc71f423a61c68b5ed9b2d8d15d