Analysis
-
max time kernel
189s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe
Resource
win10v2004-20221111-en
General
-
Target
b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe
-
Size
116KB
-
MD5
7cc3a42aaaa73c711fae9d7eb56aba0e
-
SHA1
c214042cae74ed87c2f5b888c0a43d8968a0d422
-
SHA256
b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a
-
SHA512
ea5c9ff0604b2358865989bba38c51895101ed4c7fdfd3c4ec22fc24beab747482ed8105518136343522ae263274115d96c7b8c6b9fa77db3693f5852dd39961
-
SSDEEP
1536:d+cIRGHu9mQGSp3E5zkons4MBikY+msHH0o4vwo3L2YRTB6m8AJ0x:dF4pJE5zkPBir+miUoUEYRTB6ZYE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vbxeek.exe -
Executes dropped EXE 1 IoCs
pid Process 900 vbxeek.exe -
Loads dropped DLL 2 IoCs
pid Process 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /x" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /A" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /j" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /z" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /U" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /N" vbxeek.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /n" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /B" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /c" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /g" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /p" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /Q" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /R" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /i" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /h" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /F" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /f" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /Z" b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /r" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /d" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /O" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /Z" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /K" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /E" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /J" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /G" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /V" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /I" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /t" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /D" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /Y" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /m" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /b" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /a" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /w" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /k" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /q" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /H" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /T" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /v" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /l" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /s" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /L" vbxeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vbxeek = "C:\\Users\\Admin\\vbxeek.exe /C" vbxeek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe 900 vbxeek.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 900 vbxeek.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 900 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 28 PID 2008 wrote to memory of 900 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 28 PID 2008 wrote to memory of 900 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 28 PID 2008 wrote to memory of 900 2008 b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe"C:\Users\Admin\AppData\Local\Temp\b123731c5fbadbfa35942b40367bc43e4d1ad5c41e72dbf05e782842f42c598a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\vbxeek.exe"C:\Users\Admin\vbxeek.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD54f6860385b34c97e2cbff22b3d7458ff
SHA1739e2c6a5d1081a0fbb018b6f1d14d653db87701
SHA256466a73419ed9d19901e7158a97f7d053177538671ac99308d5a5c2047ca4b6a2
SHA5120cfb0ef19314a1bdd82222e897f9ffd52d7df727941abf7719a6b22e8e33c86726bfce95523a0340bf673da153dadc947f67df9d299c6a02bebd1677c7a98006
-
Filesize
116KB
MD54f6860385b34c97e2cbff22b3d7458ff
SHA1739e2c6a5d1081a0fbb018b6f1d14d653db87701
SHA256466a73419ed9d19901e7158a97f7d053177538671ac99308d5a5c2047ca4b6a2
SHA5120cfb0ef19314a1bdd82222e897f9ffd52d7df727941abf7719a6b22e8e33c86726bfce95523a0340bf673da153dadc947f67df9d299c6a02bebd1677c7a98006
-
Filesize
116KB
MD54f6860385b34c97e2cbff22b3d7458ff
SHA1739e2c6a5d1081a0fbb018b6f1d14d653db87701
SHA256466a73419ed9d19901e7158a97f7d053177538671ac99308d5a5c2047ca4b6a2
SHA5120cfb0ef19314a1bdd82222e897f9ffd52d7df727941abf7719a6b22e8e33c86726bfce95523a0340bf673da153dadc947f67df9d299c6a02bebd1677c7a98006
-
Filesize
116KB
MD54f6860385b34c97e2cbff22b3d7458ff
SHA1739e2c6a5d1081a0fbb018b6f1d14d653db87701
SHA256466a73419ed9d19901e7158a97f7d053177538671ac99308d5a5c2047ca4b6a2
SHA5120cfb0ef19314a1bdd82222e897f9ffd52d7df727941abf7719a6b22e8e33c86726bfce95523a0340bf673da153dadc947f67df9d299c6a02bebd1677c7a98006