Analysis

  • max time kernel
    171s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:55

General

  • Target

    f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe

  • Size

    112KB

  • MD5

    05b7e9a1254b0be017a77b7db51ed440

  • SHA1

    f7939cca6442cc80a654f810ffcd3bc2d2170501

  • SHA256

    f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee

  • SHA512

    36d9f5781da1580937c04f64530e8055d7c3fe734467f7713beb39f99aedf72f6178506cf552a3772d1e2507cb629f7e014390361989edd104a57d316aadbdad

  • SSDEEP

    3072:7yplt8/lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXl:7ypltekX9kXWqgkXAkXAkXAkXtkX8kXl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\vuievi.exe
      "C:\Users\Admin\vuievi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vuievi.exe

    Filesize

    112KB

    MD5

    7c6ba79230abba2a403b7e98d19f45e6

    SHA1

    272bf92860eb31f93c337684b44a55e374eff3c0

    SHA256

    493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f

    SHA512

    447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1

  • C:\Users\Admin\vuievi.exe

    Filesize

    112KB

    MD5

    7c6ba79230abba2a403b7e98d19f45e6

    SHA1

    272bf92860eb31f93c337684b44a55e374eff3c0

    SHA256

    493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f

    SHA512

    447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1

  • \Users\Admin\vuievi.exe

    Filesize

    112KB

    MD5

    7c6ba79230abba2a403b7e98d19f45e6

    SHA1

    272bf92860eb31f93c337684b44a55e374eff3c0

    SHA256

    493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f

    SHA512

    447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1

  • \Users\Admin\vuievi.exe

    Filesize

    112KB

    MD5

    7c6ba79230abba2a403b7e98d19f45e6

    SHA1

    272bf92860eb31f93c337684b44a55e374eff3c0

    SHA256

    493eb582861368ee3c1d12e916d4b5a28c1da11f40a704b78b6335dd136fbe5f

    SHA512

    447aec703178cd869e9b83e094e10ae42bcf15e7aa4c0ce872cc7bf2853e67be471ef9c9afa76f54fbff21645dbf1654bc414db3ea4315ba665cd04b56fbffa1

  • memory/852-59-0x0000000000000000-mapping.dmp

  • memory/1536-56-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB