Analysis
-
max time kernel
204s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe
Resource
win10v2004-20221111-en
General
-
Target
b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe
-
Size
284KB
-
MD5
5fec31a93fd2232832d96bcca9843393
-
SHA1
3ae6f05640b44c894e32ad0aeb11b22e433b976b
-
SHA256
b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53
-
SHA512
b23ba043eda1e7e794d5eceac569ff386ed6a54407f2d28eebd805b5433eb7acf071b8dc7bce0d9a195da78d60bddf505c19ad43d62e8b8f4c104f854c334cc6
-
SSDEEP
3072:LnOyn6PSASmpR1TmoNkMl4ymdu+sSi5KKGTKozEDGaKUa6xUgyX6lgq1Kx5RK1fr:5jmVmoNkMl4ymdu+sSi5KKGsjO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veazoem.exe -
Executes dropped EXE 1 IoCs
pid Process 1920 veazoem.exe -
Loads dropped DLL 2 IoCs
pid Process 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /S" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /W" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /G" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /d" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /A" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /Y" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /s" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /H" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /U" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /h" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /f" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /Z" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /n" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /p" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /D" veazoem.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /B" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /E" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /X" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /C" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /K" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /a" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /F" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /c" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /r" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /y" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /u" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /j" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /l" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /T" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /v" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /m" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /x" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /L" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /V" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /o" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /q" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /Q" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /P" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /O" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /b" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /e" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /w" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /M" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /k" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /I" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /z" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /t" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /N" veazoem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe 1920 veazoem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe 1920 veazoem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1920 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe 28 PID 632 wrote to memory of 1920 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe 28 PID 632 wrote to memory of 1920 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe 28 PID 632 wrote to memory of 1920 632 b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe 28 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27 PID 1920 wrote to memory of 632 1920 veazoem.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe"C:\Users\Admin\AppData\Local\Temp\b2303568eb9b2dbe05d7e71aeedbb06b734784c64c9d6d3c915daf1734bdbb53.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\veazoem.exe"C:\Users\Admin\veazoem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD52fe598241e018c88299942a0419cddf8
SHA192f232c3472a35692e60a99c1d11fc7d176d1b5c
SHA256333e0cb1e11613b20310c146fc0aaae811669fd66ff101132ef7bc4d3084c4f8
SHA5124adc131c021bae6a4bbb7ae8ba91eb461338cd0118300bbcf54388cf9217f874cd95569f327f85a7c50cd1324f6e1abf363127f0e6b4d2e60b5880ce2394708b
-
Filesize
284KB
MD52fe598241e018c88299942a0419cddf8
SHA192f232c3472a35692e60a99c1d11fc7d176d1b5c
SHA256333e0cb1e11613b20310c146fc0aaae811669fd66ff101132ef7bc4d3084c4f8
SHA5124adc131c021bae6a4bbb7ae8ba91eb461338cd0118300bbcf54388cf9217f874cd95569f327f85a7c50cd1324f6e1abf363127f0e6b4d2e60b5880ce2394708b
-
Filesize
284KB
MD52fe598241e018c88299942a0419cddf8
SHA192f232c3472a35692e60a99c1d11fc7d176d1b5c
SHA256333e0cb1e11613b20310c146fc0aaae811669fd66ff101132ef7bc4d3084c4f8
SHA5124adc131c021bae6a4bbb7ae8ba91eb461338cd0118300bbcf54388cf9217f874cd95569f327f85a7c50cd1324f6e1abf363127f0e6b4d2e60b5880ce2394708b
-
Filesize
284KB
MD52fe598241e018c88299942a0419cddf8
SHA192f232c3472a35692e60a99c1d11fc7d176d1b5c
SHA256333e0cb1e11613b20310c146fc0aaae811669fd66ff101132ef7bc4d3084c4f8
SHA5124adc131c021bae6a4bbb7ae8ba91eb461338cd0118300bbcf54388cf9217f874cd95569f327f85a7c50cd1324f6e1abf363127f0e6b4d2e60b5880ce2394708b