Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 03:03

General

  • Target

    c0dfb6d085abd870b89beb121b1acfc1cca6ab087fb7a0bbfab5a96e166436a9.exe

  • Size

    164KB

  • MD5

    4d0a4fa052e4843dc6044593b04ae770

  • SHA1

    5c73ea35c3b62c3f81ff4c541dc7df0ceaa196f9

  • SHA256

    c0dfb6d085abd870b89beb121b1acfc1cca6ab087fb7a0bbfab5a96e166436a9

  • SHA512

    456c59520da70317cfa5acfe44febb6abaf349dec8a0e4ba51d627d8e1d2bccfa86c3c3f018d5d9a3f01884b7d4ebd234b0897b79b4c88efbf101bab83ba17a1

  • SSDEEP

    3072:esUaAUAWtoYj3Bc8T828UAw1XiazCXaN8L2YAgt4oQZiEAc:DAxBaxc8Y28I1XiUn8sg/Wl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0dfb6d085abd870b89beb121b1acfc1cca6ab087fb7a0bbfab5a96e166436a9.exe
    "C:\Users\Admin\AppData\Local\Temp\c0dfb6d085abd870b89beb121b1acfc1cca6ab087fb7a0bbfab5a96e166436a9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\viito.exe
      "C:\Users\Admin\viito.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1996

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\viito.exe

          Filesize

          164KB

          MD5

          44c1242bd126da932fb4877f4cdab69e

          SHA1

          3b60be274e8c88b5a4c4694618e2a6e34ed48d4d

          SHA256

          4a6b4ab7e98d038a5b5dfecc338503bb3e5bffc54d3a0b1ee278928a2ed952cd

          SHA512

          4a413e20c4f1cef7a16ebb7097f2e4ad5a3e7c25a3df6c3b2c13cfd239ca2bda2b9b70dba1308cf25c2b7d585d3447f535516a0025254a573ebadce6638d51c4

        • C:\Users\Admin\viito.exe

          Filesize

          164KB

          MD5

          44c1242bd126da932fb4877f4cdab69e

          SHA1

          3b60be274e8c88b5a4c4694618e2a6e34ed48d4d

          SHA256

          4a6b4ab7e98d038a5b5dfecc338503bb3e5bffc54d3a0b1ee278928a2ed952cd

          SHA512

          4a413e20c4f1cef7a16ebb7097f2e4ad5a3e7c25a3df6c3b2c13cfd239ca2bda2b9b70dba1308cf25c2b7d585d3447f535516a0025254a573ebadce6638d51c4

        • \Users\Admin\viito.exe

          Filesize

          164KB

          MD5

          44c1242bd126da932fb4877f4cdab69e

          SHA1

          3b60be274e8c88b5a4c4694618e2a6e34ed48d4d

          SHA256

          4a6b4ab7e98d038a5b5dfecc338503bb3e5bffc54d3a0b1ee278928a2ed952cd

          SHA512

          4a413e20c4f1cef7a16ebb7097f2e4ad5a3e7c25a3df6c3b2c13cfd239ca2bda2b9b70dba1308cf25c2b7d585d3447f535516a0025254a573ebadce6638d51c4

        • \Users\Admin\viito.exe

          Filesize

          164KB

          MD5

          44c1242bd126da932fb4877f4cdab69e

          SHA1

          3b60be274e8c88b5a4c4694618e2a6e34ed48d4d

          SHA256

          4a6b4ab7e98d038a5b5dfecc338503bb3e5bffc54d3a0b1ee278928a2ed952cd

          SHA512

          4a413e20c4f1cef7a16ebb7097f2e4ad5a3e7c25a3df6c3b2c13cfd239ca2bda2b9b70dba1308cf25c2b7d585d3447f535516a0025254a573ebadce6638d51c4

        • memory/1884-56-0x0000000075571000-0x0000000075573000-memory.dmp

          Filesize

          8KB