Analysis
-
max time kernel
187s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:28
Static task
static1
Behavioral task
behavioral1
Sample
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe
Resource
win10v2004-20220812-en
General
-
Target
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe
-
Size
144KB
-
MD5
1fa62feb97769e1214baf12387924b66
-
SHA1
0429a06fda3ae107ba1c7b98a0c06d1767066c2d
-
SHA256
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075
-
SHA512
f0629e99a0968732fdbc90cada822e1d3895acae6914a0be360846cb498b1085517a3af86b7181e98b52216fb1ba2a1e3bf4212a2f0ee8718e604f7dd9eee775
-
SSDEEP
768:aJ/HdK9TuB7CXe04H7cHPHYmug6UXQm1dIZE2ocOT77e:aOuBjHyj6S3T77
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
viuoru.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viuoru.exe -
Executes dropped EXE 1 IoCs
Processes:
viuoru.exepid process 3396 viuoru.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
viuoru.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ viuoru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viuoru = "C:\\Users\\Admin\\viuoru.exe" viuoru.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
viuoru.exepid process 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe 3396 viuoru.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exeviuoru.exepid process 4876 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe 3396 viuoru.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exeviuoru.exedescription pid process target process PID 4876 wrote to memory of 3396 4876 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe viuoru.exe PID 4876 wrote to memory of 3396 4876 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe viuoru.exe PID 4876 wrote to memory of 3396 4876 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe viuoru.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe PID 3396 wrote to memory of 4876 3396 viuoru.exe 46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe"C:\Users\Admin\AppData\Local\Temp\46759c1a2d463f2aa1d7ba2bb5a8b21d54bbc8da083d0b4507d87e2a97528075.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\viuoru.exe"C:\Users\Admin\viuoru.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5a67f322872644edc7711cb9adaf7cbfb
SHA10a7a5b0e0425eb0ccffeeaefb40d6d50bd5c43e2
SHA25650c50b980733fbe6dd1b406205c370527dba730c8fa2c22108d005190bea22d3
SHA51268cdeaa977742d4ec7f310b6a6a8eb630bc2e6235a53c1e3218fa3639f4abf2468887ac0cd463b658c71c9e6616f01cd489e955be63d7ab7d8c8c5aac339dae1
-
Filesize
144KB
MD5a67f322872644edc7711cb9adaf7cbfb
SHA10a7a5b0e0425eb0ccffeeaefb40d6d50bd5c43e2
SHA25650c50b980733fbe6dd1b406205c370527dba730c8fa2c22108d005190bea22d3
SHA51268cdeaa977742d4ec7f310b6a6a8eb630bc2e6235a53c1e3218fa3639f4abf2468887ac0cd463b658c71c9e6616f01cd489e955be63d7ab7d8c8c5aac339dae1