Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe
Resource
win10v2004-20220901-en
General
-
Target
b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe
-
Size
88KB
-
MD5
c12209a5599b9b653731b6d00eb7adfb
-
SHA1
69284d7823280363869bc298d2f991bdaf0d2eed
-
SHA256
b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125
-
SHA512
cfe108fa5995e3ed423df4bb4d0d7fc54c748407beb91026d6575c79caf536bb556267f8816d72969deaee632ebd6cabd8906805e9e388adcc18456f5d276aba
-
SSDEEP
1536:/Ruvi5CqG84caEz0+nCsNAhz74yWzVaCQdGV4KW:4/84vz74yOsrG5W
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viifa.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe -
Executes dropped EXE 1 IoCs
pid Process 764 viifa.exe -
Loads dropped DLL 2 IoCs
pid Process 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /n" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /t" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /g" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /i" viifa.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /t" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /m" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /b" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /a" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /d" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /x" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /h" viifa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /i" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /k" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /c" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /g" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /l" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /m" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /s" viifa.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /a" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /c" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /n" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /l" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /o" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /s" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /f" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /p" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /j" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /v" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /j" viifa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /e" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /u" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /q" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /r" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /o" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /c" b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /r" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /y" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /v" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /w" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /h" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /i" b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /w" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /x" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /z" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /q" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /e" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /u" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /b" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /d" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /y" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /z" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /f" viifa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /p" viifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\viifa = "C:\\Users\\Admin\\viifa.exe /k" viifa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe 764 viifa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 764 viifa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 764 viifa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1436 wrote to memory of 764 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 27 PID 1436 wrote to memory of 764 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 27 PID 1436 wrote to memory of 764 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 27 PID 1436 wrote to memory of 764 1436 b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe"C:\Users\Admin\AppData\Local\Temp\b0883e8ff703624707010c212acafe37ebdb68cff0859045b154607b59d4a125.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\viifa.exe"C:\Users\Admin\viifa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD51da0871290c8b38b216d2c02316fe44c
SHA1c5e3410129279925bdf6b1fb818e3499212aae39
SHA2568d112fef7225168aa5dcfb06ad224837f87706136d4e73049fa1f3b95f99f981
SHA5123ed1454ff630e0fd00b9bf279f5eb11f6da82e17bf53271e5eac0f1fb87788080c085dc91d96ae638e0fbceee9115998e7cfe2b65965a4fdeb053bc142214902
-
Filesize
88KB
MD51da0871290c8b38b216d2c02316fe44c
SHA1c5e3410129279925bdf6b1fb818e3499212aae39
SHA2568d112fef7225168aa5dcfb06ad224837f87706136d4e73049fa1f3b95f99f981
SHA5123ed1454ff630e0fd00b9bf279f5eb11f6da82e17bf53271e5eac0f1fb87788080c085dc91d96ae638e0fbceee9115998e7cfe2b65965a4fdeb053bc142214902
-
Filesize
88KB
MD51da0871290c8b38b216d2c02316fe44c
SHA1c5e3410129279925bdf6b1fb818e3499212aae39
SHA2568d112fef7225168aa5dcfb06ad224837f87706136d4e73049fa1f3b95f99f981
SHA5123ed1454ff630e0fd00b9bf279f5eb11f6da82e17bf53271e5eac0f1fb87788080c085dc91d96ae638e0fbceee9115998e7cfe2b65965a4fdeb053bc142214902
-
Filesize
88KB
MD51da0871290c8b38b216d2c02316fe44c
SHA1c5e3410129279925bdf6b1fb818e3499212aae39
SHA2568d112fef7225168aa5dcfb06ad224837f87706136d4e73049fa1f3b95f99f981
SHA5123ed1454ff630e0fd00b9bf279f5eb11f6da82e17bf53271e5eac0f1fb87788080c085dc91d96ae638e0fbceee9115998e7cfe2b65965a4fdeb053bc142214902