Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:37
Static task
static1
Behavioral task
behavioral1
Sample
cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe
Resource
win10v2004-20221111-en
General
-
Target
cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe
-
Size
140KB
-
MD5
2f37107f3eeca69aa15a889c2ab104ca
-
SHA1
48f4aa6e5115af769cc64908028bd6cca3e14b92
-
SHA256
cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64
-
SHA512
42aeb7f6b64b99b341043911f8eddb0104d5133e7a8e19de6aa9ff188ce4e1fa37769b389a1c3296284f82ab6ee2c1851cd941df6a44dc4cb6b8e24136439b7c
-
SSDEEP
1536:YnpFcf/VwssUfw5GZS5u61rC634cmY77UsMJXGoQDnzqLcTJLO01DvqlWgB0gyn8:mpFcftRLYt77UsMJXGoFDwfG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vouheo.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 vouheo.exe -
Loads dropped DLL 2 IoCs
pid Process 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /p" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /i" vouheo.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /l" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /m" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /b" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /o" cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /o" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /j" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /k" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /v" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /q" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /d" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /n" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /e" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /s" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /z" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /y" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /f" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /u" vouheo.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /t" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /r" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /a" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /w" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /h" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /g" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /c" vouheo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\vouheo = "C:\\Users\\Admin\\vouheo.exe /x" vouheo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe 2028 vouheo.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 2028 vouheo.exe 2028 vouheo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2028 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 27 PID 1348 wrote to memory of 2028 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 27 PID 1348 wrote to memory of 2028 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 27 PID 1348 wrote to memory of 2028 1348 cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe"C:\Users\Admin\AppData\Local\Temp\cdaa4075259d357b780e89dee5f54f13c69dfa9861f06af608f6fc2513b54b64.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\vouheo.exe"C:\Users\Admin\vouheo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD55e3ca9614a801a250b62f898b0198668
SHA15681912653839f66bbb489cad9a1de85e12ba7cf
SHA2567f443b7af446e9ef8dff934824edd3d672c119eccaa3b6eb5ca9cf4582287662
SHA5128c88f593bd8bc2a5c690a1aac96ae137040c95d8171bfc19bd12525e654f3eec9fc2d31144ef8367ad7280bc6c92e91c576e8ad62e3ac91f123fab7afbf4dc89
-
Filesize
140KB
MD55e3ca9614a801a250b62f898b0198668
SHA15681912653839f66bbb489cad9a1de85e12ba7cf
SHA2567f443b7af446e9ef8dff934824edd3d672c119eccaa3b6eb5ca9cf4582287662
SHA5128c88f593bd8bc2a5c690a1aac96ae137040c95d8171bfc19bd12525e654f3eec9fc2d31144ef8367ad7280bc6c92e91c576e8ad62e3ac91f123fab7afbf4dc89
-
Filesize
140KB
MD55e3ca9614a801a250b62f898b0198668
SHA15681912653839f66bbb489cad9a1de85e12ba7cf
SHA2567f443b7af446e9ef8dff934824edd3d672c119eccaa3b6eb5ca9cf4582287662
SHA5128c88f593bd8bc2a5c690a1aac96ae137040c95d8171bfc19bd12525e654f3eec9fc2d31144ef8367ad7280bc6c92e91c576e8ad62e3ac91f123fab7afbf4dc89
-
Filesize
140KB
MD55e3ca9614a801a250b62f898b0198668
SHA15681912653839f66bbb489cad9a1de85e12ba7cf
SHA2567f443b7af446e9ef8dff934824edd3d672c119eccaa3b6eb5ca9cf4582287662
SHA5128c88f593bd8bc2a5c690a1aac96ae137040c95d8171bfc19bd12525e654f3eec9fc2d31144ef8367ad7280bc6c92e91c576e8ad62e3ac91f123fab7afbf4dc89