Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe
Resource
win10v2004-20220812-en
General
-
Target
cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe
-
Size
104KB
-
MD5
b9c2b945701f5c04c7c249203c51ee2c
-
SHA1
7d8849c6c1779e7693a8579157767a2a517634f8
-
SHA256
cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60
-
SHA512
c609dfbfe8131d7396152e6a3886a517a06c07cb6bab95b2259bf8340b86d6d8af4af6621ba1b4bb0617d4964e4a3ca5bdc260248473db0cceb64db76d072108
-
SSDEEP
1536:wMLRvx+uNMs+HBchhQKNIqpOcQv0sTEFSocwB+XjLlm:FHd+eiKNZJQv0sToB+3s
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vxsun.exe -
Executes dropped EXE 1 IoCs
pid Process 1536 vxsun.exe -
Loads dropped DLL 2 IoCs
pid Process 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /f" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /b" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /k" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /a" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /d" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /n" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /l" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /q" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /j" vxsun.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /d" cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /g" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /z" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /h" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /s" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /u" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /c" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /r" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /v" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /w" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /t" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /o" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /i" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /m" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /p" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /y" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /e" vxsun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vxsun = "C:\\Users\\Admin\\vxsun.exe /x" vxsun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe 1536 vxsun.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 1536 vxsun.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1536 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 28 PID 1460 wrote to memory of 1536 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 28 PID 1460 wrote to memory of 1536 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 28 PID 1460 wrote to memory of 1536 1460 cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe"C:\Users\Admin\AppData\Local\Temp\cd5f4d0f74215e11f5b77d675c54dd813a130da8ae73b85e0b289ff44e0ebd60.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\vxsun.exe"C:\Users\Admin\vxsun.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD548fb2ec9cc976cc08b7e880504a0c438
SHA1c80aaee3a1e06a8edaa3958c5e579d4b9d31872c
SHA2569a073b7cfe72c0d723a979fa4bcd9cbfde899d0c32235ac5648e1f058ff6e4ad
SHA512d18ff2afdec3c67120a9518207ec1f380022434bcc69e57e5cac191c428733de899b0f42dc61cb979f81f610c292c5eb034e674dbf317baf5625ee7f5aa06abb
-
Filesize
104KB
MD548fb2ec9cc976cc08b7e880504a0c438
SHA1c80aaee3a1e06a8edaa3958c5e579d4b9d31872c
SHA2569a073b7cfe72c0d723a979fa4bcd9cbfde899d0c32235ac5648e1f058ff6e4ad
SHA512d18ff2afdec3c67120a9518207ec1f380022434bcc69e57e5cac191c428733de899b0f42dc61cb979f81f610c292c5eb034e674dbf317baf5625ee7f5aa06abb
-
Filesize
104KB
MD548fb2ec9cc976cc08b7e880504a0c438
SHA1c80aaee3a1e06a8edaa3958c5e579d4b9d31872c
SHA2569a073b7cfe72c0d723a979fa4bcd9cbfde899d0c32235ac5648e1f058ff6e4ad
SHA512d18ff2afdec3c67120a9518207ec1f380022434bcc69e57e5cac191c428733de899b0f42dc61cb979f81f610c292c5eb034e674dbf317baf5625ee7f5aa06abb
-
Filesize
104KB
MD548fb2ec9cc976cc08b7e880504a0c438
SHA1c80aaee3a1e06a8edaa3958c5e579d4b9d31872c
SHA2569a073b7cfe72c0d723a979fa4bcd9cbfde899d0c32235ac5648e1f058ff6e4ad
SHA512d18ff2afdec3c67120a9518207ec1f380022434bcc69e57e5cac191c428733de899b0f42dc61cb979f81f610c292c5eb034e674dbf317baf5625ee7f5aa06abb