Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
36ef9e70d0f659b5ce3e1f2b12902e0c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36ef9e70d0f659b5ce3e1f2b12902e0c.exe
Resource
win10v2004-20231215-en
General
-
Target
36ef9e70d0f659b5ce3e1f2b12902e0c.exe
-
Size
148KB
-
MD5
36ef9e70d0f659b5ce3e1f2b12902e0c
-
SHA1
06984c25a394e65ff15fe8a069ac9fee49812397
-
SHA256
e9c13dca8e06939d07b2852a32f709eaff68e0fbcb1ea79f290062b3187e4372
-
SHA512
e5f607a515ad7c4f2bd7be97a29f47629b2a4ccd2f4dc2bfe975146e552dba61e4d25e05c344884d3a314b62842d1210c0b3a4e0881344842dce39a040892f3d
-
SSDEEP
3072:gSCcW8hywakr39rAbU/XYaDJy1St9x2bANkgXyL6oILtYvFIy:gSg8hywasIaB2cKLULte
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2184 Vvyria.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\5GUTNY6MFK = "C:\\Windows\\Vvyria.exe" Vvyria.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 36ef9e70d0f659b5ce3e1f2b12902e0c.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 36ef9e70d0f659b5ce3e1f2b12902e0c.exe File created C:\Windows\Vvyria.exe 36ef9e70d0f659b5ce3e1f2b12902e0c.exe File opened for modification C:\Windows\Vvyria.exe 36ef9e70d0f659b5ce3e1f2b12902e0c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main Vvyria.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International Vvyria.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe 2184 Vvyria.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2184 2632 36ef9e70d0f659b5ce3e1f2b12902e0c.exe 28 PID 2632 wrote to memory of 2184 2632 36ef9e70d0f659b5ce3e1f2b12902e0c.exe 28 PID 2632 wrote to memory of 2184 2632 36ef9e70d0f659b5ce3e1f2b12902e0c.exe 28 PID 2632 wrote to memory of 2184 2632 36ef9e70d0f659b5ce3e1f2b12902e0c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36ef9e70d0f659b5ce3e1f2b12902e0c.exe"C:\Users\Admin\AppData\Local\Temp\36ef9e70d0f659b5ce3e1f2b12902e0c.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\Vvyria.exeC:\Windows\Vvyria.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5699c63f23ec944adf6797bdaa58d0694
SHA15ab7aa95aef5b433c1865d3912ec154bd58e47fe
SHA256ffb367b4d44ad8249f00517305badc44e94659b8c39b609989c3d55f4b001509
SHA5120323b11b38dd93b2d06518089fa09db9c221ff49e5e6c15c553f0c9d0cd13106963ff932bda85b2644bbe3dbf4dbcfdd6cd9873899911a5ee22064ade64ce9a8
-
Filesize
73KB
MD5a40aada56256d1c1e407aeaaace5cec9
SHA1ff24f632865c436cb3187e8b4c7ef7350d16e359
SHA256b8834f6487e845c04f959a077877b09ea106ca2c9b9b3c3c8d87def075e5e9e8
SHA512aa69e5e6d6487b5b47352a48d64cee564d4f798401301e8f66a70fe808b00e65f6c9d0ab3dfe6a4e5ae75fef257f62934369b6f17272732bc2578a5e99e43a57