Analysis

  • max time kernel
    150s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 03:05

General

  • Target

    c8287d313aa69a4fe7667a19c1fe4c4ef9ccfc4c4e148d8912fb716408803c40.exe

  • Size

    252KB

  • MD5

    0ac509b07075071362f199dc64d012b3

  • SHA1

    7a06dc957353ff3db3a24b2e9215b0fc55535302

  • SHA256

    c8287d313aa69a4fe7667a19c1fe4c4ef9ccfc4c4e148d8912fb716408803c40

  • SHA512

    017d67d80b8aa79cbcb4c83705d65d16db29eaee8e1f0c097fdf2064536df418fb241f4bb20cbeb144fb63c3dfe5d75652ac445d2ac954e2db4eef9c855da5f2

  • SSDEEP

    3072:VrAc/x7La2sWvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKtjWW:VrlFx/ZLA4PmG6d7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8287d313aa69a4fe7667a19c1fe4c4ef9ccfc4c4e148d8912fb716408803c40.exe
    "C:\Users\Admin\AppData\Local\Temp\c8287d313aa69a4fe7667a19c1fe4c4ef9ccfc4c4e148d8912fb716408803c40.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\vauna.exe
      "C:\Users\Admin\vauna.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1728

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\vauna.exe

          Filesize

          252KB

          MD5

          6dd24c914630446d6867dc7ad1236858

          SHA1

          bef4091207f65ee935f84b7d394c190a3d925f23

          SHA256

          a1d37f370e572a63e449892e0dec61a1b6de207b9c0fdc8f0d853c8b7e5b3d42

          SHA512

          2fd9ea6ad76ea4f0bc85317ddca5becd2a0f1c4861ba740fe3db599a5d7368b713b3af29fbb5b019541beb8c12c97305ef6fd31a3d9e7f8101a1bafe793c697e

        • C:\Users\Admin\vauna.exe

          Filesize

          252KB

          MD5

          6dd24c914630446d6867dc7ad1236858

          SHA1

          bef4091207f65ee935f84b7d394c190a3d925f23

          SHA256

          a1d37f370e572a63e449892e0dec61a1b6de207b9c0fdc8f0d853c8b7e5b3d42

          SHA512

          2fd9ea6ad76ea4f0bc85317ddca5becd2a0f1c4861ba740fe3db599a5d7368b713b3af29fbb5b019541beb8c12c97305ef6fd31a3d9e7f8101a1bafe793c697e

        • \Users\Admin\vauna.exe

          Filesize

          252KB

          MD5

          6dd24c914630446d6867dc7ad1236858

          SHA1

          bef4091207f65ee935f84b7d394c190a3d925f23

          SHA256

          a1d37f370e572a63e449892e0dec61a1b6de207b9c0fdc8f0d853c8b7e5b3d42

          SHA512

          2fd9ea6ad76ea4f0bc85317ddca5becd2a0f1c4861ba740fe3db599a5d7368b713b3af29fbb5b019541beb8c12c97305ef6fd31a3d9e7f8101a1bafe793c697e

        • \Users\Admin\vauna.exe

          Filesize

          252KB

          MD5

          6dd24c914630446d6867dc7ad1236858

          SHA1

          bef4091207f65ee935f84b7d394c190a3d925f23

          SHA256

          a1d37f370e572a63e449892e0dec61a1b6de207b9c0fdc8f0d853c8b7e5b3d42

          SHA512

          2fd9ea6ad76ea4f0bc85317ddca5becd2a0f1c4861ba740fe3db599a5d7368b713b3af29fbb5b019541beb8c12c97305ef6fd31a3d9e7f8101a1bafe793c697e

        • memory/1632-56-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB