Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe
Resource
win10v2004-20220812-en
General
-
Target
ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe
-
Size
1.2MB
-
MD5
38df01b430a44e714e2872cb069dbb9c
-
SHA1
7593a65f30da17196b2c6abe94902271dbe78063
-
SHA256
ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9
-
SHA512
5cff7614117cc68bd77104a57723b85d3875d98708039149f57eef7392e88bd1c2881a4892510768c72d0ffcdab515b4db9dd553b5e59152ba783c9945a4828c
-
SSDEEP
24576:Gt24QdLl+X+2FHARUBZQqE/aoepkbAy2945mynFz9VRQYQavcMj:M+g1TZQRanpry2jynFzPRQYQavco
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
SHH.exeSHH.exeveim.exeveim.exepid process 428 SHH.exe 1868 SHH.exe 1672 veim.exe 824 veim.exe -
Loads dropped DLL 7 IoCs
Processes:
ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exeSHH.exeSHH.exeveim.exepid process 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe 428 SHH.exe 1868 SHH.exe 1672 veim.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
veim.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run veim.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{43B4A693-5F0C-4FEE-DCAD-5600DCF90EED} = "C:\\Users\\Admin\\AppData\\Roaming\\Lyeky\\veim.exe" veim.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe \Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe \Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe \Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe C:\Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe C:\Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe \Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe C:\Users\Admin\AppData\Roaming\SHH\SHH.exe autoit_exe \Users\Admin\AppData\Roaming\Lyeky\veim.exe autoit_exe C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe autoit_exe C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe autoit_exe \Users\Admin\AppData\Roaming\Lyeky\veim.exe autoit_exe C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SHH.exeveim.exedescription pid process target process PID 428 set thread context of 1868 428 SHH.exe SHH.exe PID 1672 set thread context of 824 1672 veim.exe veim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
veim.exepid process 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe 824 veim.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SHH.exedescription pid process Token: SeSecurityPrivilege 1868 SHH.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
SHH.exeveim.exepid process 428 SHH.exe 428 SHH.exe 428 SHH.exe 1672 veim.exe 1672 veim.exe 1672 veim.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
SHH.exeveim.exepid process 428 SHH.exe 428 SHH.exe 428 SHH.exe 1672 veim.exe 1672 veim.exe 1672 veim.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exeSHH.exeSHH.exeveim.exeveim.exedescription pid process target process PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 1032 wrote to memory of 428 1032 ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 428 wrote to memory of 1868 428 SHH.exe SHH.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1868 wrote to memory of 1672 1868 SHH.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 1672 wrote to memory of 824 1672 veim.exe veim.exe PID 824 wrote to memory of 1108 824 veim.exe taskhost.exe PID 824 wrote to memory of 1108 824 veim.exe taskhost.exe PID 824 wrote to memory of 1108 824 veim.exe taskhost.exe PID 824 wrote to memory of 1108 824 veim.exe taskhost.exe PID 824 wrote to memory of 1108 824 veim.exe taskhost.exe PID 824 wrote to memory of 1180 824 veim.exe Dwm.exe PID 824 wrote to memory of 1180 824 veim.exe Dwm.exe PID 824 wrote to memory of 1180 824 veim.exe Dwm.exe PID 824 wrote to memory of 1180 824 veim.exe Dwm.exe PID 824 wrote to memory of 1180 824 veim.exe Dwm.exe PID 824 wrote to memory of 1232 824 veim.exe Explorer.EXE PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 1868 wrote to memory of 2016 1868 SHH.exe cmd.exe PID 824 wrote to memory of 1232 824 veim.exe Explorer.EXE PID 824 wrote to memory of 1232 824 veim.exe Explorer.EXE PID 824 wrote to memory of 1232 824 veim.exe Explorer.EXE PID 824 wrote to memory of 1232 824 veim.exe Explorer.EXE PID 824 wrote to memory of 2016 824 veim.exe cmd.exe PID 824 wrote to memory of 2016 824 veim.exe cmd.exe PID 824 wrote to memory of 2016 824 veim.exe cmd.exe PID 824 wrote to memory of 2016 824 veim.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe"C:\Users\Admin\AppData\Local\Temp\ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\SHH\SHH.exe"C:\Users\Admin\AppData\Roaming\SHH\SHH.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Roaming\SHH\SHH.exe"C:\Users\Admin\AppData\Roaming\SHH\SHH.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe"C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe"C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa04a7cf1.bat"5⤵PID:2016
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1313365611-1528495214-8558354851224061559-350407202-898501066618566701-1323309128"1⤵PID:896
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:276
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD56d706f8edaddba18374c5f5fdb76660a
SHA117f67587536c01c661ccede522f70b287a653983
SHA2562bffd42d55702bdd516a3b3ecad9deaee79452939b19e867622799639f2a4df1
SHA5128fffc9e511469e0bf736d23aa4d7456e4b1dc00682119690dc4f9663efa4708ebf7fe59e93d609b7790b48a641619f0866f2521cc1ec1a384b2b3f9876eeaf21
-
Filesize
1.1MB
MD525f03aefacbeee415d381bf8dbd6f44c
SHA1e31266ab52d073790095c970e77b9ce556723c1c
SHA256aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2
SHA51216349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33
-
Filesize
1.1MB
MD525f03aefacbeee415d381bf8dbd6f44c
SHA1e31266ab52d073790095c970e77b9ce556723c1c
SHA256aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2
SHA51216349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33
-
Filesize
1.1MB
MD525f03aefacbeee415d381bf8dbd6f44c
SHA1e31266ab52d073790095c970e77b9ce556723c1c
SHA256aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2
SHA51216349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33
-
Filesize
138KB
MD5e3ca3a7fad60c185f16afc3f7b370e26
SHA18ffb08ed5e9c8b55c578289129f96aafa2f6e9d6
SHA256c8330918df1d31793e8d59869a775fd276602a2397717e958ce60b1ed538dfa3
SHA5125737a1c4dc86e55d70497849f679bea554e0b835076c625d98eae3151995e06a387c199233a21b80a049a0011f2a101d0e2c2f9b27ee6c44a7eb44aefce45a76
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD525f03aefacbeee415d381bf8dbd6f44c
SHA1e31266ab52d073790095c970e77b9ce556723c1c
SHA256aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2
SHA51216349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33
-
Filesize
1.1MB
MD525f03aefacbeee415d381bf8dbd6f44c
SHA1e31266ab52d073790095c970e77b9ce556723c1c
SHA256aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2
SHA51216349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04
-
Filesize
1.1MB
MD582d3426d9da06a897ad3dae2893ee461
SHA14e9f8084633463dd8e2dd33d499dda329f88225e
SHA256a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd
SHA51232642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04