Analysis

  • max time kernel
    168s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 11:42

General

  • Target

    a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe

  • Size

    105KB

  • MD5

    63907b378f65487bcbed06918f1d3703

  • SHA1

    b183e658542fa95017f53b3c37bb8098d61ba07b

  • SHA256

    a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca

  • SHA512

    2b2429fd326844da6ae1f79cdc12b0a3b675c74ec2c8f6faee0afb5fea1317ccbbe4d268fab549c5fdb56f2e8bc3903d93e61958018d849b070ba3a0092c5a98

  • SSDEEP

    3072:NzdO7D+Mkj3+TsvzqJtgG9/VVfMzrpyBeq57P:Ev0+TsLiGMtIr0j

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe
    "C:\Users\Admin\AppData\Local\Temp\a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca.exe"
    1⤵
      PID:940
    • C:\Users\Admin\AppData\Local\Temp\vuspi.exe
      C:\Users\Admin\AppData\Local\Temp\vuspi.exe -svc
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      PID:616

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\vuspi.exe

      Filesize

      105KB

      MD5

      63907b378f65487bcbed06918f1d3703

      SHA1

      b183e658542fa95017f53b3c37bb8098d61ba07b

      SHA256

      a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca

      SHA512

      2b2429fd326844da6ae1f79cdc12b0a3b675c74ec2c8f6faee0afb5fea1317ccbbe4d268fab549c5fdb56f2e8bc3903d93e61958018d849b070ba3a0092c5a98

    • \??\c:\users\admin\appdata\local\temp\vuspi.exe

      Filesize

      105KB

      MD5

      63907b378f65487bcbed06918f1d3703

      SHA1

      b183e658542fa95017f53b3c37bb8098d61ba07b

      SHA256

      a99b0407d8b93bc8218d9a2e82be6c67dad3074c5becbb0f0b8eafd239f8eaca

      SHA512

      2b2429fd326844da6ae1f79cdc12b0a3b675c74ec2c8f6faee0afb5fea1317ccbbe4d268fab549c5fdb56f2e8bc3903d93e61958018d849b070ba3a0092c5a98

    • memory/616-79-0x0000000000230000-0x0000000000249000-memory.dmp

      Filesize

      100KB

    • memory/616-81-0x0000000000230000-0x0000000000249000-memory.dmp

      Filesize

      100KB

    • memory/940-54-0x0000000000220000-0x0000000000230000-memory.dmp

      Filesize

      64KB

    • memory/940-55-0x0000000000230000-0x0000000000249000-memory.dmp

      Filesize

      100KB

    • memory/940-56-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

      Filesize

      8KB

    • memory/940-57-0x0000000000230000-0x0000000000249000-memory.dmp

      Filesize

      100KB

    • memory/940-66-0x0000000000230000-0x0000000000249000-memory.dmp

      Filesize

      100KB

    • memory/940-82-0x0000000000230000-0x0000000000249000-memory.dmp

      Filesize

      100KB