Analysis
-
max time kernel
168s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe
Resource
win10v2004-20221111-en
General
-
Target
a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe
-
Size
105KB
-
MD5
63907b378f65487bcbed06918f1d3703
-
SHA1
b183e658542fa95017f53b3c37bb8098d61ba07b
-
SHA256
a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca
-
SHA512
2b2429fd326844da6ae1f79cdc12b0a3b675c74ec2c8f6faee0afb5fea1317ccbbe4d268fab549c5fdb56f2e8bc3903d93e61958018d849b070ba3a0092c5a98
-
SSDEEP
3072:NzdO7D+Mkj3+TsvzqJtgG9/VVfMzrpyBeq57P:Ev0+TsLiGMtIr0j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 616 vuspi.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: vuspi.exe File opened (read-only) \??\V: vuspi.exe File opened (read-only) \??\Y: vuspi.exe File opened (read-only) \??\H: vuspi.exe File opened (read-only) \??\K: vuspi.exe File opened (read-only) \??\O: vuspi.exe File opened (read-only) \??\R: vuspi.exe File opened (read-only) \??\Z: vuspi.exe File opened (read-only) \??\L: vuspi.exe File opened (read-only) \??\M: vuspi.exe File opened (read-only) \??\P: vuspi.exe File opened (read-only) \??\A: vuspi.exe File opened (read-only) \??\B: vuspi.exe File opened (read-only) \??\F: vuspi.exe File opened (read-only) \??\G: vuspi.exe File opened (read-only) \??\J: vuspi.exe File opened (read-only) \??\T: vuspi.exe File opened (read-only) \??\W: vuspi.exe File opened (read-only) \??\X: vuspi.exe File opened (read-only) \??\E: vuspi.exe File opened (read-only) \??\I: vuspi.exe File opened (read-only) \??\N: vuspi.exe File opened (read-only) \??\Q: vuspi.exe File opened (read-only) \??\U: vuspi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe"C:\Users\Admin\AppData\Local\Temp\a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe"1⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\vuspi.exeC:\Users\Admin\AppData\Local\Temp\vuspi.exe -svc1⤵
- Executes dropped EXE
- Enumerates connected drives
PID:616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD563907b378f65487bcbed06918f1d3703
SHA1b183e658542fa95017f53b3c37bb8098d61ba07b
SHA256a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca
SHA5122b2429fd326844da6ae1f79cdc12b0a3b675c74ec2c8f6faee0afb5fea1317ccbbe4d268fab549c5fdb56f2e8bc3903d93e61958018d849b070ba3a0092c5a98
-
Filesize
105KB
MD563907b378f65487bcbed06918f1d3703
SHA1b183e658542fa95017f53b3c37bb8098d61ba07b
SHA256a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca
SHA5122b2429fd326844da6ae1f79cdc12b0a3b675c74ec2c8f6faee0afb5fea1317ccbbe4d268fab549c5fdb56f2e8bc3903d93e61958018d849b070ba3a0092c5a98