Analysis
-
max time kernel
153s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe
Resource
win10v2004-20220812-en
General
-
Target
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe
-
Size
312KB
-
MD5
91ba4685c8ae3d4827600b94a1f8d751
-
SHA1
bb85a5e22f883820bbde486b2072c9741478b396
-
SHA256
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471
-
SHA512
ed21f534304aa9d14d4dbc350ee130a6e3e400237838b6a9922a3b379f2e405913c6709328fbced5ac7578bba677866cd0436a1e0bc0a670fd3e48ee6a1452ab
-
SSDEEP
6144:hZXePGG+XgYIlqAnIVDC8e5uMSXGJZPBP3Jm908q:KX+XgYMNIVa5uM1D/U08
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viuti.exe -
Executes dropped EXE 1 IoCs
pid Process 544 viuti.exe -
Loads dropped DLL 2 IoCs
pid Process 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /E" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /I" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /j" viuti.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /a" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /z" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /C" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /R" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /r" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /P" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /Z" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /i" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /W" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /T" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /w" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /h" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /K" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /O" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /f" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /d" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /A" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /o" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /H" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /S" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /k" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /u" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /D" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /F" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /g" viuti.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /B" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /q" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /p" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /L" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /U" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /m" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /Y" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /N" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /y" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /s" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /Q" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /G" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /U" 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /b" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /c" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /v" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /X" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /J" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /e" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /t" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /M" viuti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuti = "C:\\Users\\Admin\\viuti.exe /V" viuti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe 544 viuti.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 544 viuti.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 544 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 27 PID 1300 wrote to memory of 544 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 27 PID 1300 wrote to memory of 544 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 27 PID 1300 wrote to memory of 544 1300 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe"C:\Users\Admin\AppData\Local\Temp\19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\viuti.exe"C:\Users\Admin\viuti.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5540b6cc8474141a23de5f5b916fbfb24
SHA1d0e731b97d3ad90b8cd109ff863da72c1f1ea095
SHA25634ebb63a7baab00ceac61bc503f711fab902b1aedf506b9dd0521a6fc1590007
SHA51213fe6fab301856d1a22b67621bdb263bd19cd89b291999646919994316cee9b82b83dfab4499677706590973d23a57c50f2d9a7d035119cea179fb2bb79eb1ca
-
Filesize
312KB
MD5540b6cc8474141a23de5f5b916fbfb24
SHA1d0e731b97d3ad90b8cd109ff863da72c1f1ea095
SHA25634ebb63a7baab00ceac61bc503f711fab902b1aedf506b9dd0521a6fc1590007
SHA51213fe6fab301856d1a22b67621bdb263bd19cd89b291999646919994316cee9b82b83dfab4499677706590973d23a57c50f2d9a7d035119cea179fb2bb79eb1ca
-
Filesize
312KB
MD5540b6cc8474141a23de5f5b916fbfb24
SHA1d0e731b97d3ad90b8cd109ff863da72c1f1ea095
SHA25634ebb63a7baab00ceac61bc503f711fab902b1aedf506b9dd0521a6fc1590007
SHA51213fe6fab301856d1a22b67621bdb263bd19cd89b291999646919994316cee9b82b83dfab4499677706590973d23a57c50f2d9a7d035119cea179fb2bb79eb1ca
-
Filesize
312KB
MD5540b6cc8474141a23de5f5b916fbfb24
SHA1d0e731b97d3ad90b8cd109ff863da72c1f1ea095
SHA25634ebb63a7baab00ceac61bc503f711fab902b1aedf506b9dd0521a6fc1590007
SHA51213fe6fab301856d1a22b67621bdb263bd19cd89b291999646919994316cee9b82b83dfab4499677706590973d23a57c50f2d9a7d035119cea179fb2bb79eb1ca