Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
022c19e0a23e3ec236463f23b3b71489.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
022c19e0a23e3ec236463f23b3b71489.exe
Resource
win10v2004-20231215-en
General
-
Target
022c19e0a23e3ec236463f23b3b71489.exe
-
Size
292KB
-
MD5
022c19e0a23e3ec236463f23b3b71489
-
SHA1
b19136c6c82e6ca226c9f3c75b29eb945517b485
-
SHA256
9b7d2d67732d31b6b4cac80f57ae1941d2da8447caddd8320398b9513321df0c
-
SHA512
32736ff6e2d163598a346d2b12d059d148eafa1f232ae68bba28210e1cdcf5e130b453e26d265b834cdf2c0a7b195e6bb2bf330f11f7546d19a3695686f02b47
-
SSDEEP
6144:Anild4PXjBZ+oR6Cd+x1DztXtMI3gWg3tEU:nIPzBZzd+x1DztXtMI3g9mU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 022c19e0a23e3ec236463f23b3b71489.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vjvuf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 022c19e0a23e3ec236463f23b3b71489.exe -
Executes dropped EXE 1 IoCs
pid Process 3168 vjvuf.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /B" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /G" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /a" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /f" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /f" 022c19e0a23e3ec236463f23b3b71489.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /U" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /o" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /i" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /n" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /k" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /F" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /O" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /K" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /S" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /T" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /V" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /l" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /W" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /j" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /P" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /h" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /A" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /w" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /H" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /L" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /D" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /R" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /E" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /Z" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /b" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /N" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /s" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /t" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /e" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /M" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /m" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /I" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /Y" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /Q" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /J" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /C" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /X" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /d" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /y" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /r" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /g" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /x" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /z" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /v" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /q" vjvuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vjvuf = "C:\\Users\\Admin\\vjvuf.exe /u" vjvuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3304 022c19e0a23e3ec236463f23b3b71489.exe 3304 022c19e0a23e3ec236463f23b3b71489.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe 3168 vjvuf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3304 022c19e0a23e3ec236463f23b3b71489.exe 3168 vjvuf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3168 3304 022c19e0a23e3ec236463f23b3b71489.exe 92 PID 3304 wrote to memory of 3168 3304 022c19e0a23e3ec236463f23b3b71489.exe 92 PID 3304 wrote to memory of 3168 3304 022c19e0a23e3ec236463f23b3b71489.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\022c19e0a23e3ec236463f23b3b71489.exe"C:\Users\Admin\AppData\Local\Temp\022c19e0a23e3ec236463f23b3b71489.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\vjvuf.exe"C:\Users\Admin\vjvuf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5d354eca8213411524f908a35e4f96155
SHA1df1c73c42505490fc105c48de956a39802a0019d
SHA2561c466c53faaf68f1303ed59991648198fe8d71f24be6aae896694126a492689a
SHA512386eed3a9fc642db5c1fe7ac12673d09b2ebc56e9c8c47966e4ff621459969092b8fb8a249b27489516f89461af964f9332d7044f313b9e81f6ced2d4e38304d