Analysis
-
max time kernel
151s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe
Resource
win10v2004-20220901-en
General
-
Target
46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe
-
Size
312KB
-
MD5
781856bda5fbc774274fc6fc872e9cb3
-
SHA1
582ee684d4fb4db000dd0fc9860e1d2bcc623d09
-
SHA256
46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea
-
SHA512
8cbc24176726d8983348bab56f87f9df0a6e7eae4013ad8086648db7cd337d517fb414fc21b604d470d1faa91006a32651aa5e5d0663a177a0a3b454c4772708
-
SSDEEP
6144:lzbc0f7XP+g3AGJpWVzuvRHeEgRK/fObT/bGiJKv6R7MkZ4lUr8W9HuOGKhvsMMh:9w27/XvLWpu5eEgRK/fObT/bGiJlMkZy
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuerar.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 vuerar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /g" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /U" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /x" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /D" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /A" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /d" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /Y" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /Z" vuerar.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /O" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /r" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /o" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /B" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /f" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /C" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /l" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /v" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /H" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /S" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /i" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /W" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /n" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /q" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /y" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /C" 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /J" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /V" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /j" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /F" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /P" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /u" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /a" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /h" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /m" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /c" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /L" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /K" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /G" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /I" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /k" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /Q" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /b" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /s" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /w" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /e" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /M" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /z" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /T" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /X" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /p" vuerar.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /N" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /t" vuerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuerar = "C:\\Users\\Admin\\vuerar.exe /E" vuerar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 360 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe 360 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe 3620 vuerar.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 360 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe 3620 vuerar.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 360 wrote to memory of 3620 360 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe 83 PID 360 wrote to memory of 3620 360 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe 83 PID 360 wrote to memory of 3620 360 46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe"C:\Users\Admin\AppData\Local\Temp\46dee4219fffa1f2a97a95abdb45ef4bb99b93975ee440d5c014e7035ca650ea.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\vuerar.exe"C:\Users\Admin\vuerar.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD58e1ba3773b196c6d7da2da29c99ee338
SHA1e75857491453f1210edde4b0a4732c26358a6221
SHA2567c73f194fca50dd20c38da8372aa3d56d25d58c0fb7e04bbd8aafa36df4bf75b
SHA5126e17ba3398ceb004bfc9602561c8a39f0efadc523e9671a59172afabef06c0779bbb39daa86dd23633a06a276b98e94a37cbd6840247d22ff5d6c8a3f00cc61d
-
Filesize
312KB
MD58e1ba3773b196c6d7da2da29c99ee338
SHA1e75857491453f1210edde4b0a4732c26358a6221
SHA2567c73f194fca50dd20c38da8372aa3d56d25d58c0fb7e04bbd8aafa36df4bf75b
SHA5126e17ba3398ceb004bfc9602561c8a39f0efadc523e9671a59172afabef06c0779bbb39daa86dd23633a06a276b98e94a37cbd6840247d22ff5d6c8a3f00cc61d