Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe
Resource
win10v2004-20221111-en
General
-
Target
95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe
-
Size
460KB
-
MD5
0cf8b1340b29d1b10ed40eb30dee6aa0
-
SHA1
2d307968288d9ce0f0456d01746828d9c2e84397
-
SHA256
95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9
-
SHA512
0f9a870fab10136f84db10719c032511a77120b3f1b81ffc99db11300657a611fc7b9797aca85b9e7af3cf1d8472c1c5ad04b05b789d515ee30f251cfe7d0d51
-
SSDEEP
6144:fLbDdc5g8Alv20zh5lHDx5caDYg6OEpVkk/SfMbDlefuWgv6zVjr7XapPU:DvZdv20/5cULPk/S+MgiRD
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1952 qireg.exe 524 wuveex.exe 992 voruk.exe -
Deletes itself 1 IoCs
pid Process 668 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 1952 qireg.exe 1952 qireg.exe 524 wuveex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe 992 voruk.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1952 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 28 PID 1668 wrote to memory of 1952 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 28 PID 1668 wrote to memory of 1952 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 28 PID 1668 wrote to memory of 1952 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 28 PID 1668 wrote to memory of 668 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 30 PID 1668 wrote to memory of 668 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 30 PID 1668 wrote to memory of 668 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 30 PID 1668 wrote to memory of 668 1668 95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe 30 PID 1952 wrote to memory of 524 1952 qireg.exe 29 PID 1952 wrote to memory of 524 1952 qireg.exe 29 PID 1952 wrote to memory of 524 1952 qireg.exe 29 PID 1952 wrote to memory of 524 1952 qireg.exe 29 PID 524 wrote to memory of 992 524 wuveex.exe 32 PID 524 wrote to memory of 992 524 wuveex.exe 32 PID 524 wrote to memory of 992 524 wuveex.exe 32 PID 524 wrote to memory of 992 524 wuveex.exe 32 PID 524 wrote to memory of 1516 524 wuveex.exe 33 PID 524 wrote to memory of 1516 524 wuveex.exe 33 PID 524 wrote to memory of 1516 524 wuveex.exe 33 PID 524 wrote to memory of 1516 524 wuveex.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe"C:\Users\Admin\AppData\Local\Temp\95c0375181febe556a87cde056dd699ab234cd21b1792763bb78d916befd75b9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\qireg.exe"C:\Users\Admin\AppData\Local\Temp\qireg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\wuveex.exe"C:\Users\Admin\AppData\Local\Temp\wuveex.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\voruk.exe"C:\Users\Admin\AppData\Local\Temp\voruk.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1516
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD517274b63b2445bf7fec15f3480408ede
SHA12322982cde8cd21634796e7c60d00a74a2bb9efc
SHA2567c1c3db8b30e5075fc56acbacb189c863452dd24fcec801c1d7fb9210736e754
SHA51202a83b5c5932328f16753c63ee89e16f12df5ccdd3e6ab36f2807da0fcd2a89f165a386358e379aae8370053f3d33293772162ffaedf6d5acf613780b8df1682
-
Filesize
224B
MD59f92ff6da0859bd976292b04b5780e86
SHA1ce5b6b444c980e3b8bb2ec64369232fb49bbfeea
SHA2569aec6e6d6ff3dce92d4f411b8b51b069288b18638e0d2108874d5e165ab0a5e9
SHA51263afab1d4b9fd5e5bd0d090c733c0c212495a572f7209aa28c83ca11d504304eadbed94849b762a6c23bd2fdbf2b6e244d6fb394dab6f9bc8dc3a578f490c604
-
Filesize
512B
MD5aaca006c32afdb0e23117658f59b44f9
SHA1fee311960c261ac64e29055ecd2c4151630ca95d
SHA25699f76dfbb342e22263f4c292ce7753a315ffcdfad13cdb8933ef7ca2d44d41ec
SHA512fd6cf139603cc58f7d106fb40a0d44201ae4a4d04cea6a99619df4cf7312b72cc09cb9985e724d17b5bc6fba1d3bea8852c2a5499894342bf6e637ab608d8e78
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
341KB
MD53be33bcd72d7d1ff69aa8a51bb463e12
SHA1c53f973a61a980a0cc8f897e9dfb8741de00ac7e
SHA256b4092b4daee0e0818b7b24dd6fe09677346141a3bfba5e09dd20c765e285787a
SHA512ce42e6f0d0b22fb106f92958e8aa61749a903daa09aac8eb32cbd7796c1db8810971775019298de1f0d18b119bf64ab2a25927eaf97b4fe224e100b57c85d948
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
341KB
MD53be33bcd72d7d1ff69aa8a51bb463e12
SHA1c53f973a61a980a0cc8f897e9dfb8741de00ac7e
SHA256b4092b4daee0e0818b7b24dd6fe09677346141a3bfba5e09dd20c765e285787a
SHA512ce42e6f0d0b22fb106f92958e8aa61749a903daa09aac8eb32cbd7796c1db8810971775019298de1f0d18b119bf64ab2a25927eaf97b4fe224e100b57c85d948
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c
-
Filesize
460KB
MD51e23cb6568e4882314e1d5362d325c65
SHA170fc2b340ff80d64408dc3ba6b4c7f1359d8f913
SHA256daa8a8b81157d2ae3d2536275698caa165868207a626cb597a870e59faffcce3
SHA512ca826fc5d3e3df0d584023538e10ed02f9b7afc1d1c7e851e746a3d4196bb392cc6844661337413fc35f7ecaf551e895cdc0ae7b6a2c6259876b75039c4d6e5c