Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 00:46
Static task
static1
Behavioral task
behavioral1
Sample
c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe
Resource
win10v2004-20220812-en
General
-
Target
c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe
-
Size
60KB
-
MD5
867e17cab7e74599105eb3729db84fef
-
SHA1
378571e03f6fa7c4bd4f89f94ad7a93f3a80a0e4
-
SHA256
c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a
-
SHA512
a8c6d34c71f9d649b0d23c92f9e247c6e321f8f6e76b40374326a56d9dbb402d1e70d38cb02b955478ba79411b8fb6257ca5e62f62ab4f03cb361d3e7aa548e1
-
SSDEEP
1536:HWJd8aTibnZ1KqxX713c9oo4APa+rg8S:2v8hZD13c9Rt70
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viuexon.exe -
Executes dropped EXE 1 IoCs
pid Process 848 viuexon.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ viuexon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuexon = "C:\\Users\\Admin\\viuexon.exe" viuexon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe 848 viuexon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe 848 viuexon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 848 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe 27 PID 1596 wrote to memory of 848 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe 27 PID 1596 wrote to memory of 848 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe 27 PID 1596 wrote to memory of 848 1596 c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe 27 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26 PID 848 wrote to memory of 1596 848 viuexon.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe"C:\Users\Admin\AppData\Local\Temp\c7c0fdd191b11e4b3c9ef93506e5c1d1b042746db367e2853d8e2783e1f24f3a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\viuexon.exe"C:\Users\Admin\viuexon.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5ef853a7f5c0f1e9166c9748796879f7e
SHA18170299aac74595d9e4dee9cf05a81557dd6919d
SHA25672b8a1f27b460064d8e40997f39bdc34c55cb5db37998cfda473705447014c5a
SHA512cc92d43dab1516e36bca9c37bf9718f6f5c28fe1118bd5c892e7eebf0d297caf6ac4ba7ce2708254f773451ffe473a8b5ddf16a2d621ff8f374ce21db5aca27f
-
Filesize
60KB
MD5ef853a7f5c0f1e9166c9748796879f7e
SHA18170299aac74595d9e4dee9cf05a81557dd6919d
SHA25672b8a1f27b460064d8e40997f39bdc34c55cb5db37998cfda473705447014c5a
SHA512cc92d43dab1516e36bca9c37bf9718f6f5c28fe1118bd5c892e7eebf0d297caf6ac4ba7ce2708254f773451ffe473a8b5ddf16a2d621ff8f374ce21db5aca27f
-
Filesize
60KB
MD5ef853a7f5c0f1e9166c9748796879f7e
SHA18170299aac74595d9e4dee9cf05a81557dd6919d
SHA25672b8a1f27b460064d8e40997f39bdc34c55cb5db37998cfda473705447014c5a
SHA512cc92d43dab1516e36bca9c37bf9718f6f5c28fe1118bd5c892e7eebf0d297caf6ac4ba7ce2708254f773451ffe473a8b5ddf16a2d621ff8f374ce21db5aca27f
-
Filesize
60KB
MD5ef853a7f5c0f1e9166c9748796879f7e
SHA18170299aac74595d9e4dee9cf05a81557dd6919d
SHA25672b8a1f27b460064d8e40997f39bdc34c55cb5db37998cfda473705447014c5a
SHA512cc92d43dab1516e36bca9c37bf9718f6f5c28fe1118bd5c892e7eebf0d297caf6ac4ba7ce2708254f773451ffe473a8b5ddf16a2d621ff8f374ce21db5aca27f