Analysis
-
max time kernel
151s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe
Resource
win10v2004-20220812-en
General
-
Target
cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe
-
Size
296KB
-
MD5
f33307469551d974f945923ccf4678e9
-
SHA1
09e06a91303db29f740f997fc7f7a3c47069a2b0
-
SHA256
cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0
-
SHA512
8f98f6feaa1de82a36f7215e94d8c463fce4feed6c9b2ccba07a53f75b6bb69ec95218227260d2b559a0bc3a434b275c37ee1988b3f95de7974a0f759fc2d3a2
-
SSDEEP
3072:nKYmrF/MIJqOifVqfE8xfu3YOUtCPgCr0bM2C2VxZx89bRsVM8fnkTgFGtxtpTxK:nK1ViEG0s0bM2CEDV+8fnkltEU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vrpiuv.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 vrpiuv.exe -
Loads dropped DLL 2 IoCs
pid Process 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /F" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /h" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /N" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /y" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /f" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /p" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /W" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /u" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /G" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /X" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /B" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /d" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /P" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /z" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /s" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /Y" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /x" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /R" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /i" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /n" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /T" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /l" vrpiuv.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /V" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /H" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /M" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /D" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /m" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /g" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /Q" vrpiuv.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /J" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /k" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /A" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /c" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /U" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /a" cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /O" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /e" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /Z" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /q" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /b" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /C" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /L" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /a" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /o" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /r" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /t" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /w" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /I" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /S" vrpiuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vrpiuv = "C:\\Users\\Admin\\vrpiuv.exe /K" vrpiuv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe 1908 vrpiuv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 1908 vrpiuv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1908 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 28 PID 1460 wrote to memory of 1908 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 28 PID 1460 wrote to memory of 1908 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 28 PID 1460 wrote to memory of 1908 1460 cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe"C:\Users\Admin\AppData\Local\Temp\cdb9ad1e37416cb8506facf44221c3d614b86d63f6906678b8ab20f619bb76d0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\vrpiuv.exe"C:\Users\Admin\vrpiuv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5ceb60f07459bad10248f627207350f73
SHA11b6078a32b83e3d39eaf49e90529db750dd2f7ba
SHA256559a75af075c215beba73ffaba248d6195ee6871980791dea91c725dea55dd31
SHA512fbe73ab3ec4fe4a0c8ab811f262e99386732761ff06699de97a5f2e2bf29c73dcdb63180a930d2622923892900f21b01b03b3120c1bd4e00a04cca379dd94738
-
Filesize
296KB
MD5ceb60f07459bad10248f627207350f73
SHA11b6078a32b83e3d39eaf49e90529db750dd2f7ba
SHA256559a75af075c215beba73ffaba248d6195ee6871980791dea91c725dea55dd31
SHA512fbe73ab3ec4fe4a0c8ab811f262e99386732761ff06699de97a5f2e2bf29c73dcdb63180a930d2622923892900f21b01b03b3120c1bd4e00a04cca379dd94738
-
Filesize
296KB
MD5ceb60f07459bad10248f627207350f73
SHA11b6078a32b83e3d39eaf49e90529db750dd2f7ba
SHA256559a75af075c215beba73ffaba248d6195ee6871980791dea91c725dea55dd31
SHA512fbe73ab3ec4fe4a0c8ab811f262e99386732761ff06699de97a5f2e2bf29c73dcdb63180a930d2622923892900f21b01b03b3120c1bd4e00a04cca379dd94738
-
Filesize
296KB
MD5ceb60f07459bad10248f627207350f73
SHA11b6078a32b83e3d39eaf49e90529db750dd2f7ba
SHA256559a75af075c215beba73ffaba248d6195ee6871980791dea91c725dea55dd31
SHA512fbe73ab3ec4fe4a0c8ab811f262e99386732761ff06699de97a5f2e2bf29c73dcdb63180a930d2622923892900f21b01b03b3120c1bd4e00a04cca379dd94738