Analysis
-
max time kernel
189s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe
Resource
win10v2004-20221111-en
General
-
Target
8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe
-
Size
124KB
-
MD5
11b440f296d968702c09c343854b31c8
-
SHA1
194e94cd7bc8e40517bfa310850631aed0bfb54b
-
SHA256
8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08
-
SHA512
788d262fbfe5a6839e0ecdd6b7d1d2ff561b038587b648a11841e25a6481192760409513c7e8602935b037834e58b36d4e411b92528eca6573e95975f11926ff
-
SSDEEP
1536:PKEc7hwRuuBxeDtMYHa27J14ltxporZ45iMNeG0h/y:iEc7hwRukeV6gJ1uCt45eq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vueiw.exe -
Executes dropped EXE 1 IoCs
pid Process 1484 vueiw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /O" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /B" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /g" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /w" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /z" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /Q" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /C" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /V" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /E" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /U" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /n" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /h" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /p" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /A" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /d" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /H" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /W" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /c" vueiw.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /M" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /m" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /I" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /D" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /o" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /K" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /F" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /b" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /T" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /t" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /k" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /u" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /N" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /S" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /l" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /X" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /E" 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /Y" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /r" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /x" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /s" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /e" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /G" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /a" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /f" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /y" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /L" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /j" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /J" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /P" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /v" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /Z" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /q" vueiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vueiw = "C:\\Users\\Admin\\vueiw.exe /i" vueiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe 536 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe 1484 vueiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 536 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe 1484 vueiw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 1484 536 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe 83 PID 536 wrote to memory of 1484 536 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe 83 PID 536 wrote to memory of 1484 536 8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe"C:\Users\Admin\AppData\Local\Temp\8d4d1d88dd1e24473d3f8ca03c59e1e738e045988cded3532feff6be291c2d08.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\vueiw.exe"C:\Users\Admin\vueiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD52a85f900f49087b71f9c2024e1b2cf35
SHA160f18e80a01e66df4ab44f72c419c04b08b889ff
SHA25610fc9b20dd3930a731b833b07b132d929c3c836e478866b9fd9c0334997b2fcf
SHA51249584e7e95d30e33f922bfa592655d83ce1ba63c43a630f939c5d2c39ef21030d4a75abbde9909d5737139f2a3aac07434314064788766dc2e3985c6b7704734
-
Filesize
124KB
MD52a85f900f49087b71f9c2024e1b2cf35
SHA160f18e80a01e66df4ab44f72c419c04b08b889ff
SHA25610fc9b20dd3930a731b833b07b132d929c3c836e478866b9fd9c0334997b2fcf
SHA51249584e7e95d30e33f922bfa592655d83ce1ba63c43a630f939c5d2c39ef21030d4a75abbde9909d5737139f2a3aac07434314064788766dc2e3985c6b7704734