Analysis
-
max time kernel
186s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 11:41
Static task
static1
Behavioral task
behavioral1
Sample
a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe
Resource
win10v2004-20221111-en
General
-
Target
a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe
-
Size
100KB
-
MD5
0a0105487e5149f5db89e3e78f8cb9a0
-
SHA1
345b796777af8c646eb906efe8e4257eb699c70e
-
SHA256
a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a
-
SHA512
2282b4615652239b64227ef7c1b6b117b2396225e328af32cf5b11ebebda39d98d843d363deab9b1503bcb598ef90e95d4956ea80a64f5fba1df975e1d70c551
-
SSDEEP
1536:8+tGC82NTzwNpMGAc4ohrPXo+73Rez8b0SyKNIjnZrJ:5wNwurPX7CKCnlJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vdvev.exe -
Executes dropped EXE 1 IoCs
pid Process 1520 vdvev.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /T" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /X" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /q" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /M" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /w" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /n" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /u" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /R" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /g" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /W" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /k" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /H" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /C" vdvev.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /P" a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /Q" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /U" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /D" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /d" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /S" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /E" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /I" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /v" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /c" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /i" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /h" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /B" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /P" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /N" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /Y" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /O" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /t" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /x" vdvev.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /J" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /a" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /f" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /z" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /b" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /F" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /K" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /y" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /o" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /r" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /V" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /G" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /e" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /Z" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /j" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /L" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /l" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /p" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /m" vdvev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\vdvev = "C:\\Users\\Admin\\vdvev.exe /s" vdvev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe 1520 vdvev.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 1520 vdvev.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1520 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 27 PID 1628 wrote to memory of 1520 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 27 PID 1628 wrote to memory of 1520 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 27 PID 1628 wrote to memory of 1520 1628 a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe"C:\Users\Admin\AppData\Local\Temp\a7f300f44c6f4d1268519ea646958799ccc2336b25e5a0a96af452aa4265f08a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\vdvev.exe"C:\Users\Admin\vdvev.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5995f74601dd77657ac67a28bec2a091b
SHA1c0a44a33d3a1786b0707c653b634c929708c2de2
SHA25657de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6
SHA5124bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0
-
Filesize
100KB
MD5995f74601dd77657ac67a28bec2a091b
SHA1c0a44a33d3a1786b0707c653b634c929708c2de2
SHA25657de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6
SHA5124bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0
-
Filesize
100KB
MD5995f74601dd77657ac67a28bec2a091b
SHA1c0a44a33d3a1786b0707c653b634c929708c2de2
SHA25657de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6
SHA5124bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0
-
Filesize
100KB
MD5995f74601dd77657ac67a28bec2a091b
SHA1c0a44a33d3a1786b0707c653b634c929708c2de2
SHA25657de72feedf6806f4f8eac808ed4203ab9c05d6743a1ced8e3ca7cc651688dc6
SHA5124bf432360541d331538630edb06904412aa2a4ead8393062d79ffd5e66cbf9689b6ff0c5ec0bc06ae57ec09ab2d6cc7601c630c9f9bc0225991e58840816a2d0