Analysis
-
max time kernel
169s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe
Resource
win10v2004-20220812-en
General
-
Target
9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe
-
Size
212KB
-
MD5
0f036d6e5960e68b24d5da15adb8072e
-
SHA1
6077ec68c69ab5c1e11fce5e5653b901f90bb15e
-
SHA256
9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5
-
SHA512
5263cd1890dac252beff8d05ef555b1f399383cd771eaef5c29c78a13fadf543b350ce0a903939ae7bf6265606c29571b756fe1f17a24c7c00f47342b39a6941
-
SSDEEP
6144:iAAKwwPPGiczY09umHh7K5cUXEBwrYVHhAgY65cJ:bAbyuxY09umH45cUXEBwUVHhAgY65u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuiwauk.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 vuiwauk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /f" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /z" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /g" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /c" vuiwauk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /t" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /f" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /t" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /d" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /l" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /y" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /h" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /l" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /p" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /o" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /d" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /h" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /b" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /s" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /v" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /m" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /w" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /m" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /z" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /r" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /a" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /q" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /e" vuiwauk.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /r" 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /p" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /b" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /i" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /v" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /n" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /s" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /g" vuiwauk.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /u" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /y" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /s" 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /e" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /i" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /a" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /k" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /j" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /w" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /q" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /x" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /k" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /j" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /x" vuiwauk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /u" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /o" vuiwauk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /r" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /c" vuiwauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuiwauk = "C:\\Users\\Admin\\vuiwauk.exe /n" vuiwauk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4904 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe 4904 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe 3056 vuiwauk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 vuiwauk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4904 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe 3056 vuiwauk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3056 4904 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe 80 PID 4904 wrote to memory of 3056 4904 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe 80 PID 4904 wrote to memory of 3056 4904 9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe"C:\Users\Admin\AppData\Local\Temp\9fd94edc753c63c3e8facfd27697d346ab3511c93e198b9207f52dee39cbe5b5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\vuiwauk.exe"C:\Users\Admin\vuiwauk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD558166970cd7259e088b6caefa6744d6a
SHA164e5208beb527fdabeede38cecbb65e1af41756c
SHA256f89bb4114fb91aab1f9e2d1609d6536bc39ee0e506a1e425724149839cbb9394
SHA512e8c9d31e6a9d88a93801c7ad447c13d4050767a8b81ba1a5f89002d41b91dfcd049f948c7b2a5df655f2947239de3fb3ba1c976c7817260916af528c63c1e36f
-
Filesize
212KB
MD558166970cd7259e088b6caefa6744d6a
SHA164e5208beb527fdabeede38cecbb65e1af41756c
SHA256f89bb4114fb91aab1f9e2d1609d6536bc39ee0e506a1e425724149839cbb9394
SHA512e8c9d31e6a9d88a93801c7ad447c13d4050767a8b81ba1a5f89002d41b91dfcd049f948c7b2a5df655f2947239de3fb3ba1c976c7817260916af528c63c1e36f