Analysis
-
max time kernel
171s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:55
Static task
static1
Behavioral task
behavioral1
Sample
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
Resource
win10v2004-20220901-en
General
-
Target
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
-
Size
112KB
-
MD5
05b7e9a1254b0be017a77b7db51ed440
-
SHA1
f7939cca6442cc80a654f810ffcd3bc2d2170501
-
SHA256
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee
-
SHA512
36d9f5781da1580937c04f64530e8055d7c3fe734467f7713beb39f99aedf72f6178506cf552a3772d1e2507cb629f7e014390361989edd104a57d316aadbdad
-
SSDEEP
3072:7yplt8/lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXl:7ypltekX9kXWqgkXAkXAkXAkXtkX8kXl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
vuievi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuievi.exe -
Executes dropped EXE 1 IoCs
Processes:
vuievi.exepid process 852 vuievi.exe -
Loads dropped DLL 2 IoCs
Processes:
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exepid process 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vuievi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vuievi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vuievi = "C:\\Users\\Admin\\vuievi.exe" vuievi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
vuievi.exepid process 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe 852 vuievi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exevuievi.exepid process 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe 852 vuievi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exevuievi.exedescription pid process target process PID 1536 wrote to memory of 852 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe vuievi.exe PID 1536 wrote to memory of 852 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe vuievi.exe PID 1536 wrote to memory of 852 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe vuievi.exe PID 1536 wrote to memory of 852 1536 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe vuievi.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 852 wrote to memory of 1536 852 vuievi.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe"C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\vuievi.exe"C:\Users\Admin\vuievi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD57c6ba79230abba2a403b7e98d19f45e6
SHA1272bf92860eb31f93c337684b44a55e374eff3c0
SHA256493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f
SHA512447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1
-
Filesize
112KB
MD57c6ba79230abba2a403b7e98d19f45e6
SHA1272bf92860eb31f93c337684b44a55e374eff3c0
SHA256493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f
SHA512447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1
-
Filesize
112KB
MD57c6ba79230abba2a403b7e98d19f45e6
SHA1272bf92860eb31f93c337684b44a55e374eff3c0
SHA256493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f
SHA512447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1
-
Filesize
112KB
MD57c6ba79230abba2a403b7e98d19f45e6
SHA1272bf92860eb31f93c337684b44a55e374eff3c0
SHA256493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f
SHA512447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1