Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe
Resource
win10v2004-20220901-en
General
-
Target
32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe
-
Size
232KB
-
MD5
0d1128eea9e8ed064a14f1a065035608
-
SHA1
5e41ba830d8baf1be9f6e28ec777aaf9d3689e96
-
SHA256
32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc
-
SHA512
5931909f8a30294bd53eedc2bc32c0f2a11e8ca394384a57eb8686f8c35b7b231b9722d3ce790f9ef4332aeffac8cd2e72cebba696e884545263f31a180aee84
-
SSDEEP
6144:kVcgofuADylVl85IwwiXeujvWBxD2dMp/FFc8cft:+cRuADylVl85IwwiXeujvWBxD2dO/Fs1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vmkeq.exe -
Executes dropped EXE 1 IoCs
pid Process 4868 vmkeq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /T" 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /f" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /R" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /J" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /q" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /H" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /L" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /k" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /m" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /C" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /F" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /W" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /g" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /o" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /u" vmkeq.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /D" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /e" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /p" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /A" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /r" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /X" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /x" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /K" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /j" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /b" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /c" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /h" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /M" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /t" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /V" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /d" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /Z" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /O" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /n" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /N" vmkeq.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /G" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /y" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /B" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /l" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /a" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /S" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /Q" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /U" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /i" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /s" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /z" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /P" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /Y" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /T" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /E" vmkeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmkeq = "C:\\Users\\Admin\\vmkeq.exe /v" vmkeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe 1572 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe 4868 vmkeq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1572 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe 4868 vmkeq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4868 1572 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe 81 PID 1572 wrote to memory of 4868 1572 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe 81 PID 1572 wrote to memory of 4868 1572 32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe"C:\Users\Admin\AppData\Local\Temp\32b896a8a42b90dffcd8c0ae909eade0f46e573e30d6b5224825aca9feee6cbc.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\vmkeq.exe"C:\Users\Admin\vmkeq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD51fefbde9a6618aedc026bc5b669ff914
SHA12e2756cadea23e91d3c5e7c221f2dd4012e8d269
SHA2561069a890aee00ff88abce0c048da9ebb3973f661aadf3e261c553fd982b8ea5e
SHA512c45f6dcf4d061e66d9988e07bb96b99c9647ace9bdea9ca6eea9ee40b062664d9b0c88b7b9d7b6985efd8a9d61ead35c721c741231f4c43ae969865fdfa93958
-
Filesize
232KB
MD51fefbde9a6618aedc026bc5b669ff914
SHA12e2756cadea23e91d3c5e7c221f2dd4012e8d269
SHA2561069a890aee00ff88abce0c048da9ebb3973f661aadf3e261c553fd982b8ea5e
SHA512c45f6dcf4d061e66d9988e07bb96b99c9647ace9bdea9ca6eea9ee40b062664d9b0c88b7b9d7b6985efd8a9d61ead35c721c741231f4c43ae969865fdfa93958