Analysis

  • max time kernel
    155s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:55

General

  • Target

    b292b62fe86dd9c3bd799c35b84a58ab58c439738f35c109547e1005bc9a8abc.exe

  • Size

    77KB

  • MD5

    b4d5d82b3b40b044f447ed1ec3d3f89f

  • SHA1

    16febcd3b8f972e01271d91d4a1676f15d6ad0ea

  • SHA256

    b292b62fe86dd9c3bd799c35b84a58ab58c439738f35c109547e1005bc9a8abc

  • SHA512

    7639a9a0e034abff038cc21c4cfa0195b135f85d80a97db52559b86ee628ce16d59559532f09becf85f207452bd2cedb72aa02bd6b84c8279038303339232ecd

  • SSDEEP

    1536:0RfFwS4S15Bx8pEttgdO/mXpgWXOJgQmmogDcMH5fCVsJVafuegWXAi+oX9tWV0m:AfFwXS15Bx8pEttgdO/mXpgWXOJgQmmy

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b292b62fe86dd9c3bd799c35b84a58ab58c439738f35c109547e1005bc9a8abc.exe
    "C:\Users\Admin\AppData\Local\Temp\b292b62fe86dd9c3bd799c35b84a58ab58c439738f35c109547e1005bc9a8abc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\vouguu.exe
      "C:\Users\Admin\vouguu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1924

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vouguu.exe
    Filesize

    77KB

    MD5

    d7347ac3e0d39c613b5c11b7ee8c633b

    SHA1

    75b9cc53ad68c552cdf9cc49db2d9eeb6c6ce11a

    SHA256

    d26681ffc9ffeece3d3c04b25cd57b335ddfe57847ea9093c1b7dd2c46bda6b2

    SHA512

    24d52f46d7ec7d0317bc7590c83199470eb23571e58f0ffd7b66d5e714f1e0ee9567b1cc35228e3e08d46a02fd740762b87df6510bd234f4b3667b715afa54b9

  • C:\Users\Admin\vouguu.exe
    Filesize

    77KB

    MD5

    d7347ac3e0d39c613b5c11b7ee8c633b

    SHA1

    75b9cc53ad68c552cdf9cc49db2d9eeb6c6ce11a

    SHA256

    d26681ffc9ffeece3d3c04b25cd57b335ddfe57847ea9093c1b7dd2c46bda6b2

    SHA512

    24d52f46d7ec7d0317bc7590c83199470eb23571e58f0ffd7b66d5e714f1e0ee9567b1cc35228e3e08d46a02fd740762b87df6510bd234f4b3667b715afa54b9

  • \Users\Admin\vouguu.exe
    Filesize

    77KB

    MD5

    d7347ac3e0d39c613b5c11b7ee8c633b

    SHA1

    75b9cc53ad68c552cdf9cc49db2d9eeb6c6ce11a

    SHA256

    d26681ffc9ffeece3d3c04b25cd57b335ddfe57847ea9093c1b7dd2c46bda6b2

    SHA512

    24d52f46d7ec7d0317bc7590c83199470eb23571e58f0ffd7b66d5e714f1e0ee9567b1cc35228e3e08d46a02fd740762b87df6510bd234f4b3667b715afa54b9

  • \Users\Admin\vouguu.exe
    Filesize

    77KB

    MD5

    d7347ac3e0d39c613b5c11b7ee8c633b

    SHA1

    75b9cc53ad68c552cdf9cc49db2d9eeb6c6ce11a

    SHA256

    d26681ffc9ffeece3d3c04b25cd57b335ddfe57847ea9093c1b7dd2c46bda6b2

    SHA512

    24d52f46d7ec7d0317bc7590c83199470eb23571e58f0ffd7b66d5e714f1e0ee9567b1cc35228e3e08d46a02fd740762b87df6510bd234f4b3667b715afa54b9

  • memory/1228-56-0x0000000075561000-0x0000000075563000-memory.dmp
    Filesize

    8KB

  • memory/1924-59-0x0000000000000000-mapping.dmp