Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe
Resource
win10v2004-20221111-en
General
-
Target
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe
-
Size
227KB
-
MD5
4782afaa8f95e9b3b09d5049720bd6fc
-
SHA1
d1ade740968ba4ba339ac78df36a24afa21d9eaa
-
SHA256
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d
-
SHA512
cb8e25d3c5181718e92626c81944896c2056f876b92635cc0f52541333e185e37711f6efd601f5237426d751bf739abdc86b2fe020cb8e1c20b4669e6cf2f2b1
-
SSDEEP
3072:UXCiLk7ndEFIp8d94jVS1CzyySvS9uhvqkH3njNJz6sjB/PyzFfIE/GtH5c6hRzi:U4YI09oS1C+yi0kX8l65c6VF+FbYzH1k
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Veozou = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Veozou.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Z: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exee0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exedescription pid process target process PID 2040 set thread context of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 set thread context of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exesvchost.exee0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exepid process 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe 668 svchost.exe 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exepid process 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exesvchost.exenotepad.exedescription pid process Token: SeDebugPrivilege 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe Token: SeDebugPrivilege 668 svchost.exe Token: SeDebugPrivilege 1492 notepad.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exee0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exesvchost.exee0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exedescription pid process target process PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 2040 wrote to memory of 772 2040 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 668 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 772 wrote to memory of 668 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 772 wrote to memory of 668 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 772 wrote to memory of 668 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 772 wrote to memory of 632 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 772 wrote to memory of 632 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 772 wrote to memory of 632 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 772 wrote to memory of 632 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 772 wrote to memory of 632 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 772 wrote to memory of 632 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 772 wrote to memory of 668 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 668 wrote to memory of 1492 668 svchost.exe notepad.exe PID 668 wrote to memory of 1492 668 svchost.exe notepad.exe PID 668 wrote to memory of 1492 668 svchost.exe notepad.exe PID 668 wrote to memory of 1492 668 svchost.exe notepad.exe PID 668 wrote to memory of 1492 668 svchost.exe notepad.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 772 wrote to memory of 1640 772 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe PID 1640 wrote to memory of 668 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 1640 wrote to memory of 668 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe svchost.exe PID 1640 wrote to memory of 632 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 1640 wrote to memory of 632 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe calc.exe PID 1640 wrote to memory of 1492 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe notepad.exe PID 1640 wrote to memory of 1492 1640 e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe"C:\Users\Admin\AppData\Local\Temp\e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe"C:\Users\Admin\AppData\Local\Temp\e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe"C:\Users\Admin\AppData\Local\Temp\e0f25a2ac3ada78a560de6f651fe5d59f17e3948c6b5dc36f67a3e200775d16d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640