Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 13:10
Static task
static1
Behavioral task
behavioral1
Sample
711f879bd56173691f22859195e0581b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
711f879bd56173691f22859195e0581b.exe
Resource
win10v2004-20231215-en
General
-
Target
711f879bd56173691f22859195e0581b.exe
-
Size
80KB
-
MD5
711f879bd56173691f22859195e0581b
-
SHA1
f7dbaa37c5df8fa93dc4c524ab60bad97689a9b0
-
SHA256
526d659f698077d5f6082872b74b5f4b328ee284a3ca406ff8cabc5a74c933bd
-
SHA512
84708b3debddd9f341dd31773d85b0c16df8082933551b9d23b1caa89270f0bb9f9e908dc05ec03f43e8d8f9b52acd123926eb47a57888b542f774d35da414d5
-
SSDEEP
1536:vQ7wLYvKGlTGQxguIxZTAwlpwFJ0T72mocT:4oYvrKxZfUFJ0T72mBT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 711f879bd56173691f22859195e0581b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veiudo.exe -
Executes dropped EXE 1 IoCs
pid Process 1292 veiudo.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 711f879bd56173691f22859195e0581b.exe 2360 711f879bd56173691f22859195e0581b.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /s" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /f" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /d" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /a" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /e" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /j" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /m" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /p" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /b" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /z" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /u" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /r" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /k" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /w" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /t" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /y" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /x" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /q" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /i" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /l" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /c" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /v" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /o" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /n" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /d" 711f879bd56173691f22859195e0581b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /h" veiudo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\veiudo = "C:\\Users\\Admin\\veiudo.exe /g" veiudo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 711f879bd56173691f22859195e0581b.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe 1292 veiudo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2360 711f879bd56173691f22859195e0581b.exe 1292 veiudo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1292 2360 711f879bd56173691f22859195e0581b.exe 28 PID 2360 wrote to memory of 1292 2360 711f879bd56173691f22859195e0581b.exe 28 PID 2360 wrote to memory of 1292 2360 711f879bd56173691f22859195e0581b.exe 28 PID 2360 wrote to memory of 1292 2360 711f879bd56173691f22859195e0581b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\711f879bd56173691f22859195e0581b.exe"C:\Users\Admin\AppData\Local\Temp\711f879bd56173691f22859195e0581b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\veiudo.exe"C:\Users\Admin\veiudo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD56dc2a36258f011925e22f468252da46a
SHA1afc53125b1efdde9d3e0d4cf5385471cf46dd41d
SHA256d8499ff5720280ef8cf82a0e6fa05c56d73b595fef78a2dc862651aea1598200
SHA51275e58c9185b48da5ea1ebc1e725a641fe75eb4414700e17975408cddcbd6b0fdc8c6f1fe6fa10093a67fb9c2f80e5bbe923ff3c5a08c55165fa154d7f17f257c