Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:18

General

  • Target

    5931c43dabd4420d65dc0ba5dc701c6ccba4e8396166226c3f020ad0d71e2198.exe

  • Size

    296KB

  • MD5

    08859369ad05d2c04e157ea1452bf020

  • SHA1

    311a797edf9b7d48de09cf0a4d8f77337b22bf50

  • SHA256

    5931c43dabd4420d65dc0ba5dc701c6ccba4e8396166226c3f020ad0d71e2198

  • SHA512

    864be52209515626bb735f6323e3fa90dc60ab7499b242acaf6ceafabc8a561475bb1a2994e77e59844b2e78cec5445a855e4b2d1941caf342102dfb62fc8f42

  • SSDEEP

    3072:IP8eHbzh7sAFEouHwbBAW4hXNzcd6HFfak/K4jaU3bxTlGb:IEkz/FEouH+BAi4HFfAgLpQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5931c43dabd4420d65dc0ba5dc701c6ccba4e8396166226c3f020ad0d71e2198.exe
    "C:\Users\Admin\AppData\Local\Temp\5931c43dabd4420d65dc0ba5dc701c6ccba4e8396166226c3f020ad0d71e2198.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:360
    • C:\Users\Admin\viutuv.exe
      "C:\Users\Admin\viutuv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:968

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\viutuv.exe

          Filesize

          296KB

          MD5

          ecbb29515eedf0d3371276a537bd16cd

          SHA1

          e7f617afa1488dc9dac1500ec7d5ae9e560fff6d

          SHA256

          ba417da358fd219a443ac99eceeaa3ef2fcfb30c96144a42606f88555037ccc2

          SHA512

          dd81d1d42891c9aa6fad6ba22739050924953df7ce50287acdbbd600be44e64e45fc8203e5b94fc6731ecc823dfdac80b62ec98c7fce07035d7d0b6016e6cb7c

        • C:\Users\Admin\viutuv.exe

          Filesize

          296KB

          MD5

          ecbb29515eedf0d3371276a537bd16cd

          SHA1

          e7f617afa1488dc9dac1500ec7d5ae9e560fff6d

          SHA256

          ba417da358fd219a443ac99eceeaa3ef2fcfb30c96144a42606f88555037ccc2

          SHA512

          dd81d1d42891c9aa6fad6ba22739050924953df7ce50287acdbbd600be44e64e45fc8203e5b94fc6731ecc823dfdac80b62ec98c7fce07035d7d0b6016e6cb7c

        • \Users\Admin\viutuv.exe

          Filesize

          296KB

          MD5

          ecbb29515eedf0d3371276a537bd16cd

          SHA1

          e7f617afa1488dc9dac1500ec7d5ae9e560fff6d

          SHA256

          ba417da358fd219a443ac99eceeaa3ef2fcfb30c96144a42606f88555037ccc2

          SHA512

          dd81d1d42891c9aa6fad6ba22739050924953df7ce50287acdbbd600be44e64e45fc8203e5b94fc6731ecc823dfdac80b62ec98c7fce07035d7d0b6016e6cb7c

        • \Users\Admin\viutuv.exe

          Filesize

          296KB

          MD5

          ecbb29515eedf0d3371276a537bd16cd

          SHA1

          e7f617afa1488dc9dac1500ec7d5ae9e560fff6d

          SHA256

          ba417da358fd219a443ac99eceeaa3ef2fcfb30c96144a42606f88555037ccc2

          SHA512

          dd81d1d42891c9aa6fad6ba22739050924953df7ce50287acdbbd600be44e64e45fc8203e5b94fc6731ecc823dfdac80b62ec98c7fce07035d7d0b6016e6cb7c

        • memory/360-56-0x0000000075771000-0x0000000075773000-memory.dmp

          Filesize

          8KB