Analysis
-
max time kernel
48s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 22:54
Behavioral task
behavioral1
Sample
7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe
Resource
win7-20220812-en
General
-
Target
7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe
-
Size
583KB
-
MD5
9074d929951809bc497f37a5ee049fdd
-
SHA1
dd42c5a6621e11b74c6c0352759596386ed40a9e
-
SHA256
7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea
-
SHA512
7ad0bd53263d5d26e28dac163f96a56398027a723401861ceb14e139017c429f727ea63314987ea38de32e847a7ad598dc837ade09eb4aaa4f7bab3ed6b23a44
-
SSDEEP
12288:ZgCYxPVQ1KRLLIyDASbumfbKFsdrojwSzunLEjzaQ/K1V+qr:ZgCYQ1LGum4sx8Kofd/uV+w
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-56.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-58.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-60.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1124 Vkifx.exe -
resource yara_rule behavioral1/memory/1072-61-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral1/memory/1072-65-0x0000000000400000-0x0000000000586000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe Vkifx.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Vkifx.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Vkifx.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Vkifx.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Vkifx.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Vkifx.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE Vkifx.exe File opened for modification C:\Program Files\7-Zip\7z.exe Vkifx.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Vkifx.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Vkifx.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Vkifx.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe Vkifx.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Vkifx.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe Vkifx.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Vkifx.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Vkifx.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe Vkifx.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe Vkifx.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe Vkifx.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Vkifx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Vkifx.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Vkifx.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Vkifx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1124 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe 27 PID 1072 wrote to memory of 1124 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe 27 PID 1072 wrote to memory of 1124 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe 27 PID 1072 wrote to memory of 1124 1072 7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe 27 PID 1124 wrote to memory of 280 1124 Vkifx.exe 30 PID 1124 wrote to memory of 280 1124 Vkifx.exe 30 PID 1124 wrote to memory of 280 1124 Vkifx.exe 30 PID 1124 wrote to memory of 280 1124 Vkifx.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe"C:\Users\Admin\AppData\Local\Temp\7d7e243758420b8d35c6b2531d45a70ee15d10f0925b8095ddb7fb02d71c4bea.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Vkifx.exeC:\Users\Admin\AppData\Local\Temp\Vkifx.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6e721549.bat" "3⤵PID:280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD56c74dc22fc6e777230eb1950bf032cbd
SHA1a84c1a7f9ba142fd711ca5d2455d611b13acd85c
SHA256d8037798f57b91c3ac4976b2baf96987c7160ae4f0b8d4e54ad6715b2c8c1565
SHA5125aadd49d3e342bba311b2d92dc02445e6e7a3aea29edbea09dfd33fa58c06c85bc18067576e1cde4009a3d3106bad0ce45eecc2e2f6e2063f9ee221b30b8915b
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e