Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
0edb0900c3769ce3d33c6817860370be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0edb0900c3769ce3d33c6817860370be.exe
Resource
win10v2004-20231222-en
General
-
Target
0edb0900c3769ce3d33c6817860370be.exe
-
Size
108KB
-
MD5
0edb0900c3769ce3d33c6817860370be
-
SHA1
a16fdfe12e9f1b9c2b53c448627e67c7448b8178
-
SHA256
5c0157ca3996f7596691dbed06f7a40e0800dbf5b425ef0cf7df32febc415626
-
SHA512
9a267c2ed51256fcc02f25223d89bf7eb3c608bee63860377dc5159f4f2a3f1561a3624e94d88c78d121a3558955e194523b3d2d073e23400865362181ba8b48
-
SSDEEP
1536:gzcKiB6oQ7Lh5+sXmNt0ttdPXLq0zTrk:ucmoIeZtwXTzTo
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viiwu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0edb0900c3769ce3d33c6817860370be.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 viiwu.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 0edb0900c3769ce3d33c6817860370be.exe 2188 0edb0900c3769ce3d33c6817860370be.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /q" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /w" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /c" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /k" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /i" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /n" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /j" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /e" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /v" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /t" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /y" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /u" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /o" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /a" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /r" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /f" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /s" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /m" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /z" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /d" 0edb0900c3769ce3d33c6817860370be.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /h" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /g" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /b" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /p" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /d" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /l" viiwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\viiwu = "C:\\Users\\Admin\\viiwu.exe /x" viiwu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 0edb0900c3769ce3d33c6817860370be.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe 2652 viiwu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 0edb0900c3769ce3d33c6817860370be.exe 2652 viiwu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2652 2188 0edb0900c3769ce3d33c6817860370be.exe 28 PID 2188 wrote to memory of 2652 2188 0edb0900c3769ce3d33c6817860370be.exe 28 PID 2188 wrote to memory of 2652 2188 0edb0900c3769ce3d33c6817860370be.exe 28 PID 2188 wrote to memory of 2652 2188 0edb0900c3769ce3d33c6817860370be.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0edb0900c3769ce3d33c6817860370be.exe"C:\Users\Admin\AppData\Local\Temp\0edb0900c3769ce3d33c6817860370be.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\viiwu.exe"C:\Users\Admin\viiwu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5eb9cd5aeb574a339fd6711f309c44d4b
SHA18b8f9446a29124bbc3d2ce7844131f9b115c2ddc
SHA256937812ee0c1895a17eca55a53264a4dc96b6a5ef64b9b2f7275d24a5f138c617
SHA5128dd7139fa8dc67a81045913a97f0087b53d4e0feb76988be3b526539a4184de6a4730c5c120fcd4632f140b2be75e74df48ec8bef559b48e15a015ba7d782c61