Analysis

  • max time kernel
    154s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:08

General

  • Target

    2c1a093a21f6f21cb4e0f28a09e2ff218354eb9faf38baa7c0fd892a64a87d7d.exe

  • Size

    328KB

  • MD5

    72d71104a3c0b1fec3e0d7a85a38c154

  • SHA1

    eedbab8dd830d16f4d2a82dda5aa719ed07bf722

  • SHA256

    2c1a093a21f6f21cb4e0f28a09e2ff218354eb9faf38baa7c0fd892a64a87d7d

  • SHA512

    9cd5b7cf6ba7f65b55c2bc818074017f75546250ee7b3553c449ffc67bf0435b84006930d000203db5ccbbc84f381a3bc372dea383225a7bf0be1f5982f1a0ed

  • SSDEEP

    3072:R3EaE31dpYN/UpD+cu5p0fZahWA69l2zzk1wV4Ghq4ibRSioBEtazeV5bo9:R3HIrpYdWD+cZ1wV4lo6tazeVU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c1a093a21f6f21cb4e0f28a09e2ff218354eb9faf38baa7c0fd892a64a87d7d.exe
    "C:\Users\Admin\AppData\Local\Temp\2c1a093a21f6f21cb4e0f28a09e2ff218354eb9faf38baa7c0fd892a64a87d7d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\vuoraa.exe
      "C:\Users\Admin\vuoraa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vuoraa.exe

    Filesize

    328KB

    MD5

    460e2f9c6b65f4da6e1200711531bbeb

    SHA1

    75af1cd9b3804235d88982c7e58d233127301501

    SHA256

    7a66e1d0d6823f282509b9ec87ab1aef079216fa5ab3c09625db223059b0c4f9

    SHA512

    744c05c756420ce7ece8680f60aa5c2d63ebb5a8773ce14fee1b42585daae7cc63fc70d7aad9fc1affc92db1a05d3185442eff0a9f1673e5830e4a29be1c0f53

  • C:\Users\Admin\vuoraa.exe

    Filesize

    328KB

    MD5

    460e2f9c6b65f4da6e1200711531bbeb

    SHA1

    75af1cd9b3804235d88982c7e58d233127301501

    SHA256

    7a66e1d0d6823f282509b9ec87ab1aef079216fa5ab3c09625db223059b0c4f9

    SHA512

    744c05c756420ce7ece8680f60aa5c2d63ebb5a8773ce14fee1b42585daae7cc63fc70d7aad9fc1affc92db1a05d3185442eff0a9f1673e5830e4a29be1c0f53

  • \Users\Admin\vuoraa.exe

    Filesize

    328KB

    MD5

    460e2f9c6b65f4da6e1200711531bbeb

    SHA1

    75af1cd9b3804235d88982c7e58d233127301501

    SHA256

    7a66e1d0d6823f282509b9ec87ab1aef079216fa5ab3c09625db223059b0c4f9

    SHA512

    744c05c756420ce7ece8680f60aa5c2d63ebb5a8773ce14fee1b42585daae7cc63fc70d7aad9fc1affc92db1a05d3185442eff0a9f1673e5830e4a29be1c0f53

  • \Users\Admin\vuoraa.exe

    Filesize

    328KB

    MD5

    460e2f9c6b65f4da6e1200711531bbeb

    SHA1

    75af1cd9b3804235d88982c7e58d233127301501

    SHA256

    7a66e1d0d6823f282509b9ec87ab1aef079216fa5ab3c09625db223059b0c4f9

    SHA512

    744c05c756420ce7ece8680f60aa5c2d63ebb5a8773ce14fee1b42585daae7cc63fc70d7aad9fc1affc92db1a05d3185442eff0a9f1673e5830e4a29be1c0f53

  • memory/564-56-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB