Analysis

  • max time kernel
    205s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 19:51

General

  • Target

    52580895d9ef4eff29155e53b4e954ca30531053a6eee5e5dc2068bf589972db.exe

  • Size

    176KB

  • MD5

    af1683d88027a62fcbbed95ec4065a03

  • SHA1

    0bc83f3eaf12097ad1e6ef7b809c6415bfd1e92f

  • SHA256

    52580895d9ef4eff29155e53b4e954ca30531053a6eee5e5dc2068bf589972db

  • SHA512

    70e518d8fdad77a3cda0a356e7f016f12fa29fb367b74f972b6e2388291e2ae6b67c427daaaabcedd0d37d36d8c61a25f827af310055fec376faa02f4478da93

  • SSDEEP

    3072:w9Goe5g+GwD8w2+d5bWIrJ4E5n41sSLeH8ozK/d/18Ulyc4oQZiEm:42WIrJ4E5n41pVN/jh7W

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52580895d9ef4eff29155e53b4e954ca30531053a6eee5e5dc2068bf589972db.exe
    "C:\Users\Admin\AppData\Local\Temp\52580895d9ef4eff29155e53b4e954ca30531053a6eee5e5dc2068bf589972db.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\vmpauq.exe
      "C:\Users\Admin\vmpauq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vmpauq.exe

    Filesize

    176KB

    MD5

    4f9964bde7cd1ec1a6a1efb18d447f7e

    SHA1

    509ee39148c987eb7c7774df8c3524139141dae3

    SHA256

    9ce952f677d6c0ed6ccd72deba5429720345c6d54ac3a9afb9f92dbe3d1f4412

    SHA512

    7dc1d17d1286c709ccce71c3e9812a5cb7b106c92611150db4b76779ef64f683a1d257dff2921f03f0521c1c716145abd49df5d53854acdd477661d3049b1d24

  • C:\Users\Admin\vmpauq.exe

    Filesize

    176KB

    MD5

    4f9964bde7cd1ec1a6a1efb18d447f7e

    SHA1

    509ee39148c987eb7c7774df8c3524139141dae3

    SHA256

    9ce952f677d6c0ed6ccd72deba5429720345c6d54ac3a9afb9f92dbe3d1f4412

    SHA512

    7dc1d17d1286c709ccce71c3e9812a5cb7b106c92611150db4b76779ef64f683a1d257dff2921f03f0521c1c716145abd49df5d53854acdd477661d3049b1d24

  • memory/448-132-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/448-135-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3140-141-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3140-142-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB