Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
vessel details.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
vessel details.exe
Resource
win10v2004-20220901-en
General
-
Target
vessel details.exe
-
Size
1.3MB
-
MD5
efc0259fa13cd8aa1f93f71f8514f092
-
SHA1
da7869163ff19e04e1980a7c2f8256105cab7b46
-
SHA256
d9f4e779213274a043f417b7a465d7c1d9b1738382a9611e0f82661dd0b5b333
-
SHA512
ae20cd978c6472d4ff05f98dfc2fcc77a4e2b5e37217c2d723e551388eea95b2c135aad981ffe6c26650d8fdc1ab6a95a568466400fe2169580a572ae9bf4735
-
SSDEEP
24576:c/hBmG4xHesArxgqLMslqCUb4rAdiKO5sdQcyIJthsUsDKRIhe1tZE3s:KhBx4HoxJlDUb6TGmYJ5sGGheB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation vessel details.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vbxvzycfu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Zqgstdjlbhm\\Vbxvzycfu.exe\"" vessel details.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2768 powershell.exe 2768 powershell.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe 5000 vessel details.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 5000 vessel details.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2768 5000 vessel details.exe 82 PID 5000 wrote to memory of 2768 5000 vessel details.exe 82 PID 5000 wrote to memory of 2768 5000 vessel details.exe 82 PID 5000 wrote to memory of 4264 5000 vessel details.exe 91 PID 5000 wrote to memory of 4264 5000 vessel details.exe 91 PID 5000 wrote to memory of 4264 5000 vessel details.exe 91 PID 5000 wrote to memory of 4712 5000 vessel details.exe 92 PID 5000 wrote to memory of 4712 5000 vessel details.exe 92 PID 5000 wrote to memory of 4712 5000 vessel details.exe 92 PID 5000 wrote to memory of 3080 5000 vessel details.exe 93 PID 5000 wrote to memory of 3080 5000 vessel details.exe 93 PID 5000 wrote to memory of 3080 5000 vessel details.exe 93 PID 5000 wrote to memory of 4984 5000 vessel details.exe 94 PID 5000 wrote to memory of 4984 5000 vessel details.exe 94 PID 5000 wrote to memory of 4984 5000 vessel details.exe 94 PID 5000 wrote to memory of 5096 5000 vessel details.exe 95 PID 5000 wrote to memory of 5096 5000 vessel details.exe 95 PID 5000 wrote to memory of 5096 5000 vessel details.exe 95 PID 5000 wrote to memory of 1228 5000 vessel details.exe 96 PID 5000 wrote to memory of 1228 5000 vessel details.exe 96 PID 5000 wrote to memory of 1228 5000 vessel details.exe 96 PID 5000 wrote to memory of 3336 5000 vessel details.exe 97 PID 5000 wrote to memory of 3336 5000 vessel details.exe 97 PID 5000 wrote to memory of 3336 5000 vessel details.exe 97 PID 5000 wrote to memory of 4724 5000 vessel details.exe 98 PID 5000 wrote to memory of 4724 5000 vessel details.exe 98 PID 5000 wrote to memory of 4724 5000 vessel details.exe 98 PID 5000 wrote to memory of 2700 5000 vessel details.exe 99 PID 5000 wrote to memory of 2700 5000 vessel details.exe 99 PID 5000 wrote to memory of 2700 5000 vessel details.exe 99 PID 5000 wrote to memory of 4312 5000 vessel details.exe 100 PID 5000 wrote to memory of 4312 5000 vessel details.exe 100 PID 5000 wrote to memory of 4312 5000 vessel details.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\vessel details.exe"C:\Users\Admin\AppData\Local\Temp\vessel details.exe"2⤵PID:4312
-