Analysis
-
max time kernel
386s -
max time network
385s -
platform
windows7_x64 -
resource
win7-20230220-it -
resource tags
arch:x64arch:x86image:win7-20230220-itlocale:it-itos:windows7-x64systemwindows -
submitted
01-03-2023 23:22
Static task
static1
Behavioral task
behavioral1
Sample
SUPPLIES LIST.....exe
Resource
win7-20230220-it
Behavioral task
behavioral2
Sample
SUPPLIES LIST.....exe
Resource
win10v2004-20230220-it
General
-
Target
SUPPLIES LIST.....exe
-
Size
1.1MB
-
MD5
e98902e8b25c5fd9b076085b4ec07425
-
SHA1
da75f7df5c4dd88fa452857b27ad7608a1d960a7
-
SHA256
fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
-
SHA512
076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
SSDEEP
24576:0RmJkcoQricOIQxiZY1iaDCksbOsMez/Y/Lmog1INgfM/:RJZoQrbTFZY1iaDYfAos
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VZOMCK.lnk SUPPLIES LIST.....exe -
Executes dropped EXE 6 IoCs
pid Process 1012 HFHVFU.exe 1060 HFHVFU.exe 2032 HFHVFU.exe 1984 HFHVFU.exe 1708 HFHVFU.exe 320 HFHVFU.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\VZOMCK = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\HFHVFU.exe\"" SUPPLIES LIST.....exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run SUPPLIES LIST.....exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001231d-61.dat autoit_exe behavioral1/files/0x000900000001231d-62.dat autoit_exe behavioral1/files/0x000900000001231d-63.dat autoit_exe behavioral1/files/0x000900000001231d-64.dat autoit_exe behavioral1/files/0x000900000001231d-65.dat autoit_exe behavioral1/files/0x000900000001231d-66.dat autoit_exe behavioral1/files/0x000900000001231d-67.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe 1496 SUPPLIES LIST.....exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1496 SUPPLIES LIST.....exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1496 wrote to memory of 544 1496 SUPPLIES LIST.....exe 28 PID 1496 wrote to memory of 544 1496 SUPPLIES LIST.....exe 28 PID 1496 wrote to memory of 544 1496 SUPPLIES LIST.....exe 28 PID 1496 wrote to memory of 544 1496 SUPPLIES LIST.....exe 28 PID 1496 wrote to memory of 772 1496 SUPPLIES LIST.....exe 29 PID 1496 wrote to memory of 772 1496 SUPPLIES LIST.....exe 29 PID 1496 wrote to memory of 772 1496 SUPPLIES LIST.....exe 29 PID 1496 wrote to memory of 772 1496 SUPPLIES LIST.....exe 29 PID 544 wrote to memory of 636 544 cmd.exe 31 PID 544 wrote to memory of 636 544 cmd.exe 31 PID 544 wrote to memory of 636 544 cmd.exe 31 PID 544 wrote to memory of 636 544 cmd.exe 31 PID 1660 wrote to memory of 1012 1660 taskeng.exe 34 PID 1660 wrote to memory of 1012 1660 taskeng.exe 34 PID 1660 wrote to memory of 1012 1660 taskeng.exe 34 PID 1660 wrote to memory of 1012 1660 taskeng.exe 34 PID 1660 wrote to memory of 1060 1660 taskeng.exe 35 PID 1660 wrote to memory of 1060 1660 taskeng.exe 35 PID 1660 wrote to memory of 1060 1660 taskeng.exe 35 PID 1660 wrote to memory of 1060 1660 taskeng.exe 35 PID 1660 wrote to memory of 2032 1660 taskeng.exe 36 PID 1660 wrote to memory of 2032 1660 taskeng.exe 36 PID 1660 wrote to memory of 2032 1660 taskeng.exe 36 PID 1660 wrote to memory of 2032 1660 taskeng.exe 36 PID 1660 wrote to memory of 1984 1660 taskeng.exe 37 PID 1660 wrote to memory of 1984 1660 taskeng.exe 37 PID 1660 wrote to memory of 1984 1660 taskeng.exe 37 PID 1660 wrote to memory of 1984 1660 taskeng.exe 37 PID 1660 wrote to memory of 1708 1660 taskeng.exe 38 PID 1660 wrote to memory of 1708 1660 taskeng.exe 38 PID 1660 wrote to memory of 1708 1660 taskeng.exe 38 PID 1660 wrote to memory of 1708 1660 taskeng.exe 38 PID 1660 wrote to memory of 320 1660 taskeng.exe 39 PID 1660 wrote to memory of 320 1660 taskeng.exe 39 PID 1660 wrote to memory of 320 1660 taskeng.exe 39 PID 1660 wrote to memory of 320 1660 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\SUPPLIES LIST.....exe"C:\Users\Admin\AppData\Local\Temp\SUPPLIES LIST.....exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn VZOMCK.exe /tr C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe /sc minute /mo 12⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn VZOMCK.exe /tr C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:636
-
-
-
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\VZOMCK.vbs2⤵PID:772
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B6768B8E-0124-485E-BF4C-6A217567CDA3} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exeC:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe2⤵
- Executes dropped EXE
PID:1012
-
-
C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exeC:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe2⤵
- Executes dropped EXE
PID:1060
-
-
C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exeC:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe2⤵
- Executes dropped EXE
PID:2032
-
-
C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exeC:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe2⤵
- Executes dropped EXE
PID:1984
-
-
C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exeC:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe2⤵
- Executes dropped EXE
PID:1708
-
-
C:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exeC:\Users\Admin\AppData\Roaming\Windata\HFHVFU.exe2⤵
- Executes dropped EXE
PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5b8d0644b20114da7ae2a9e17ae0f85c4
SHA107be933f96b984cf73afd62574279231b2ae371f
SHA2564facb94515c9c6f88d0998b190c5d99c68eaa30ddc6458ba102ddb59b890e832
SHA5128140d588f844266bd7ee6043d4226f7e61861e0f0a73a5a7b252a3582a1833888036828a0041a671e4618c531978f43c168935248c4aa1d91d8ec0f7fc234f27
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2
-
Filesize
1.1MB
MD5e98902e8b25c5fd9b076085b4ec07425
SHA1da75f7df5c4dd88fa452857b27ad7608a1d960a7
SHA256fc9bf2effffbbd12c39aa6da2c6e73f44fac91081a5db95b085dd0e1c8fe1a88
SHA512076f73761ad22f655b29cde60f629e610aae4463f03415c1b9adbb6f8cb88c1e59ab76f5da048d92beb345e3536bb43a658e29db22a76b1a61ced0107e331ce2