Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe
Resource
win10v2004-20220812-en
General
-
Target
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe
-
Size
295KB
-
MD5
c1a460115e757a30d1e70ab79e6e7abc
-
SHA1
ec7e3da6aaf1f3247189732f997fd535b16a157d
-
SHA256
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d
-
SHA512
202ba40829735e01d6cc809a2e964ef438241a088c448abe93d815ccd00f56428f365b4273c7ca036ee6030c0b392c5aef555e03c71356c8baff39d786ff2b99
-
SSDEEP
6144:YFBLHT/5oGXLKMioMTj4P+YMsGOkk4W4HTPs2erNm3:Y/v/5oGXUtT82YXRL4Wd22g3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vium.exepid process 1532 vium.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1968 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exepid process 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vium.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run vium.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7666262C-A453-7E09-A104-2BAB2380F87E} = "C:\\Users\\Admin\\AppData\\Roaming\\Piel\\vium.exe" vium.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exevium.exepid process 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe 1532 vium.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exedescription pid process target process PID 1480 set thread context of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe -
Processes:
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\324224B5-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
vium.exepid process 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe 1532 vium.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exeWinMail.execmd.exedescription pid process Token: SeSecurityPrivilege 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe Token: SeSecurityPrivilege 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe Token: SeSecurityPrivilege 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe Token: SeManageVolumePrivilege 1552 WinMail.exe Token: SeSecurityPrivilege 1968 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1552 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exevium.exedescription pid process target process PID 1480 wrote to memory of 1532 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe vium.exe PID 1480 wrote to memory of 1532 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe vium.exe PID 1480 wrote to memory of 1532 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe vium.exe PID 1480 wrote to memory of 1532 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe vium.exe PID 1532 wrote to memory of 1248 1532 vium.exe taskhost.exe PID 1532 wrote to memory of 1248 1532 vium.exe taskhost.exe PID 1532 wrote to memory of 1248 1532 vium.exe taskhost.exe PID 1532 wrote to memory of 1248 1532 vium.exe taskhost.exe PID 1532 wrote to memory of 1248 1532 vium.exe taskhost.exe PID 1532 wrote to memory of 1360 1532 vium.exe Dwm.exe PID 1532 wrote to memory of 1360 1532 vium.exe Dwm.exe PID 1532 wrote to memory of 1360 1532 vium.exe Dwm.exe PID 1532 wrote to memory of 1360 1532 vium.exe Dwm.exe PID 1532 wrote to memory of 1360 1532 vium.exe Dwm.exe PID 1532 wrote to memory of 1392 1532 vium.exe Explorer.EXE PID 1532 wrote to memory of 1392 1532 vium.exe Explorer.EXE PID 1532 wrote to memory of 1392 1532 vium.exe Explorer.EXE PID 1532 wrote to memory of 1392 1532 vium.exe Explorer.EXE PID 1532 wrote to memory of 1392 1532 vium.exe Explorer.EXE PID 1532 wrote to memory of 1480 1532 vium.exe f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe PID 1532 wrote to memory of 1480 1532 vium.exe f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe PID 1532 wrote to memory of 1480 1532 vium.exe f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe PID 1532 wrote to memory of 1480 1532 vium.exe f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe PID 1532 wrote to memory of 1480 1532 vium.exe f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe PID 1532 wrote to memory of 1552 1532 vium.exe WinMail.exe PID 1532 wrote to memory of 1552 1532 vium.exe WinMail.exe PID 1532 wrote to memory of 1552 1532 vium.exe WinMail.exe PID 1532 wrote to memory of 1552 1532 vium.exe WinMail.exe PID 1532 wrote to memory of 1552 1532 vium.exe WinMail.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1480 wrote to memory of 1968 1480 f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe cmd.exe PID 1532 wrote to memory of 1672 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1672 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1672 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1672 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1672 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1604 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1604 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1604 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1604 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 1604 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 632 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 632 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 632 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 632 1532 vium.exe DllHost.exe PID 1532 wrote to memory of 632 1532 vium.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe"C:\Users\Admin\AppData\Local\Temp\f1eb3681d121b45c0a1f330d9708bbef40ee5570067acc3a238e8da16ad8fd2d.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Roaming\Piel\vium.exe"C:\Users\Admin\AppData\Roaming\Piel\vium.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe3bbe2c2.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1672
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD56e3de92247777c04a6885eb35582c6bb
SHA137d45e8f4a44808ad45015d76e7ceef2f73a9b18
SHA2565deb428a51517693a6e72b56faf69c4e0bc683396208b48c2e96ca1b143b9ea1
SHA5125f92dc5e0bad79ad11896e7caf2f419e8ebf4fc853d449c820f46b5c1cb5f203e8aa8b6ea415657098c61bb00374d1c626540b9b3605265a721a34e7f69c1f5b
-
Filesize
295KB
MD50cc8a2da2a2b863e96121387c0d57cf6
SHA1b12d73619cc071010f2599dfd3f042ae44a8c749
SHA256b78f473c6739219a56aaa8550b8ebac88793d7ab3c9d93898e211e06d1e18773
SHA512212cab9b6af2de636b3ebd67b5a9dd3ee3f9ede8d8040d910f2d9eac5fa5c25fec2d2ca1887ee3986fb40f3cd8f2d8354ca304dfba8a9605a7b60465e6261e73
-
Filesize
295KB
MD50cc8a2da2a2b863e96121387c0d57cf6
SHA1b12d73619cc071010f2599dfd3f042ae44a8c749
SHA256b78f473c6739219a56aaa8550b8ebac88793d7ab3c9d93898e211e06d1e18773
SHA512212cab9b6af2de636b3ebd67b5a9dd3ee3f9ede8d8040d910f2d9eac5fa5c25fec2d2ca1887ee3986fb40f3cd8f2d8354ca304dfba8a9605a7b60465e6261e73
-
Filesize
398B
MD5fde597ba01f10de0d705ca6bbecddf15
SHA14e09480eea79ebfd499156f31a578c375ae505b5
SHA256e7f18a0f510a23bb698c67e262dd8d4bcb3fc8549a432da7188c922c6f09f27f
SHA512010f546d5d7f2a5f8d1c12fc77198849cee8d8032766da2215acf20d7b6ac85ab92c1b422601a3d6c75359ac3ce56b83ebde3f666ee861bb15802d977901fe9c
-
Filesize
295KB
MD50cc8a2da2a2b863e96121387c0d57cf6
SHA1b12d73619cc071010f2599dfd3f042ae44a8c749
SHA256b78f473c6739219a56aaa8550b8ebac88793d7ab3c9d93898e211e06d1e18773
SHA512212cab9b6af2de636b3ebd67b5a9dd3ee3f9ede8d8040d910f2d9eac5fa5c25fec2d2ca1887ee3986fb40f3cd8f2d8354ca304dfba8a9605a7b60465e6261e73
-
Filesize
295KB
MD50cc8a2da2a2b863e96121387c0d57cf6
SHA1b12d73619cc071010f2599dfd3f042ae44a8c749
SHA256b78f473c6739219a56aaa8550b8ebac88793d7ab3c9d93898e211e06d1e18773
SHA512212cab9b6af2de636b3ebd67b5a9dd3ee3f9ede8d8040d910f2d9eac5fa5c25fec2d2ca1887ee3986fb40f3cd8f2d8354ca304dfba8a9605a7b60465e6261e73