Analysis
-
max time kernel
151s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 22:45
Static task
static1
Behavioral task
behavioral1
Sample
c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe
Resource
win10v2004-20221111-en
General
-
Target
c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe
-
Size
224KB
-
MD5
1072cb754be102811c45d2ac3bcbf9fc
-
SHA1
0b58e35f6f51c4f76566d55e03f671ed2c211e95
-
SHA256
c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca
-
SHA512
faec34b86de29592221fd80332a08bd79e73d2f45dc713648a4a507842727fcdda9f028b3c9d54c53403273d7b7ce8b12120777983c05f8fe2c2da95179a1221
-
SSDEEP
3072:Sro4sUW1bU4SmOLCxokVq2pt91IrnXHTmchf8Yr7Br2C9fDcB/yX/4UlrIz:Sr9PhmOLm/42n91MnXHTmchfI/yX/4V
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veahoo.exe -
Executes dropped EXE 1 IoCs
pid Process 588 veahoo.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /d" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /m" veahoo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /y" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /q" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /a" c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /a" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /f" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /e" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /b" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /r" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /g" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /k" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /i" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /n" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /w" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /h" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /p" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /c" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /j" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /o" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /v" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /x" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /l" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /z" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /t" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /u" veahoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\veahoo = "C:\\Users\\Admin\\veahoo.exe /s" veahoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe 588 veahoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 588 veahoo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 588 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 26 PID 1976 wrote to memory of 588 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 26 PID 1976 wrote to memory of 588 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 26 PID 1976 wrote to memory of 588 1976 c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe"C:\Users\Admin\AppData\Local\Temp\c0aff43fc8a34cf8d2ef508e49597d552a80af10eb27e866e371abb8402197ca.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\veahoo.exe"C:\Users\Admin\veahoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD518fd16abc082435c81dd581dd1f935b6
SHA1053dc70940b53c9603d6854527afacdeec19a01b
SHA25602612c0bd38f05096f3a59be711b04500d78056fd4a2a923086f54caf5d536e2
SHA5122f25aab5113c3e1472fd80cabfacaee43201f9fdc54c7a7c0e1cc4a6f5163a078cc5be4d6e63415fbc8fa1fb215397e7d069002db4d318797048fcae4764dcca
-
Filesize
224KB
MD518fd16abc082435c81dd581dd1f935b6
SHA1053dc70940b53c9603d6854527afacdeec19a01b
SHA25602612c0bd38f05096f3a59be711b04500d78056fd4a2a923086f54caf5d536e2
SHA5122f25aab5113c3e1472fd80cabfacaee43201f9fdc54c7a7c0e1cc4a6f5163a078cc5be4d6e63415fbc8fa1fb215397e7d069002db4d318797048fcae4764dcca
-
Filesize
224KB
MD518fd16abc082435c81dd581dd1f935b6
SHA1053dc70940b53c9603d6854527afacdeec19a01b
SHA25602612c0bd38f05096f3a59be711b04500d78056fd4a2a923086f54caf5d536e2
SHA5122f25aab5113c3e1472fd80cabfacaee43201f9fdc54c7a7c0e1cc4a6f5163a078cc5be4d6e63415fbc8fa1fb215397e7d069002db4d318797048fcae4764dcca
-
Filesize
224KB
MD518fd16abc082435c81dd581dd1f935b6
SHA1053dc70940b53c9603d6854527afacdeec19a01b
SHA25602612c0bd38f05096f3a59be711b04500d78056fd4a2a923086f54caf5d536e2
SHA5122f25aab5113c3e1472fd80cabfacaee43201f9fdc54c7a7c0e1cc4a6f5163a078cc5be4d6e63415fbc8fa1fb215397e7d069002db4d318797048fcae4764dcca