Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 23:25
Static task
static1
Behavioral task
behavioral1
Sample
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe
Resource
win10v2004-20221111-en
General
-
Target
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe
-
Size
144KB
-
MD5
e51c9656caaa74ae856dd67c5e4bbaf0
-
SHA1
8aac8ca17dbc5864f14422771f6781ca6bcc2444
-
SHA256
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
-
SHA512
7002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
SSDEEP
3072:T4Dq0BO5VIdhvoiOhkidHTBzSP052WKKM4XR14dv:69vhOhjdzBGPeHKIrY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vouuje.exe -
Executes dropped EXE 2 IoCs
pid Process 1368 vouuje.exe 880 vouuje.exe -
Loads dropped DLL 2 IoCs
pid Process 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /r" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /y" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /h" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /a" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /z" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /v" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /s" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /k" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /x" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /n" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /u" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /i" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /g" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /j" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /b" vouuje.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /w" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /p" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /t" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /m" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /l" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /o" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /e" vouuje.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /q" vouuje.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /q" 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouuje = "C:\\Users\\Admin\\vouuje.exe /c" vouuje.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vouuje.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vouuje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf vouuje.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1808 set thread context of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1368 set thread context of 880 1368 vouuje.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe 880 vouuje.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 1368 vouuje.exe 880 vouuje.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 1808 wrote to memory of 836 1808 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 28 PID 836 wrote to memory of 1368 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 29 PID 836 wrote to memory of 1368 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 29 PID 836 wrote to memory of 1368 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 29 PID 836 wrote to memory of 1368 836 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 29 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30 PID 1368 wrote to memory of 880 1368 vouuje.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe"C:\Users\Admin\AppData\Local\Temp\4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\vouuje.exe"C:\Users\Admin\vouuje.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\vouuje.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:880
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643