Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:32
Static task
static1
Behavioral task
behavioral1
Sample
112532d1629bc34ede0b3a84092e767a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
112532d1629bc34ede0b3a84092e767a.exe
Resource
win10v2004-20231222-en
General
-
Target
112532d1629bc34ede0b3a84092e767a.exe
-
Size
248KB
-
MD5
112532d1629bc34ede0b3a84092e767a
-
SHA1
b3c90b431fd0055b67b76d5ff5052b26e0c656d5
-
SHA256
6bdf1add93b8ec529b644aa5665d117b2e51a3e68b419d650ed0dc8dd9ce4ef0
-
SHA512
564e358f0e4477e844b57f905afe249ee0e01054c8ec6e05ba7f35835286241a3727c12c24e552dc407aaf86ce41d0379c47ef8a461a02ea345c74c24baad977
-
SSDEEP
3072:0/vfFph32Uu+WoxsUr6/iVr0VsxJ//g/nk1/J/////Q////q/////2///SIM///0:0Xf
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vpfoz.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 vpfoz.exe -
Loads dropped DLL 2 IoCs
pid Process 2500 112532d1629bc34ede0b3a84092e767a.exe 2500 112532d1629bc34ede0b3a84092e767a.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /n" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /w" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /X" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /Q" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /s" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /I" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /o" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /f" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /E" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /P" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /N" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /z" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /b" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /y" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /q" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /m" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /t" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /r" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /U" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /J" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /C" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /H" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /W" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /i" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /p" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /L" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /g" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /j" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /R" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /K" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /k" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /M" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /G" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /a" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /F" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /v" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /S" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /B" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /h" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /V" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /A" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /u" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /Y" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /Z" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /x" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /D" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /e" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /O" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /l" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /T" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /c" vpfoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\vpfoz = "C:\\Users\\Admin\\vpfoz.exe /d" vpfoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe 3056 vpfoz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2500 112532d1629bc34ede0b3a84092e767a.exe 3056 vpfoz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3056 2500 112532d1629bc34ede0b3a84092e767a.exe 28 PID 2500 wrote to memory of 3056 2500 112532d1629bc34ede0b3a84092e767a.exe 28 PID 2500 wrote to memory of 3056 2500 112532d1629bc34ede0b3a84092e767a.exe 28 PID 2500 wrote to memory of 3056 2500 112532d1629bc34ede0b3a84092e767a.exe 28 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23 PID 3056 wrote to memory of 2500 3056 vpfoz.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\112532d1629bc34ede0b3a84092e767a.exe"C:\Users\Admin\AppData\Local\Temp\112532d1629bc34ede0b3a84092e767a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\vpfoz.exe"C:\Users\Admin\vpfoz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5ba843bb98f560cc4d4d4f665918b021d
SHA1ffa3c1e7dc129b74bf6ba674e636c34fb1f58b74
SHA2569adb83e9e34678b23cf6310be0904bcc64e352c5c7b0f9fa1512144cc0f4fae8
SHA5128b0369a080907dd3b6d8e390ef7595837eb9e5b0d60d8ae6b716238fd849d792c549675ab93dfc6adf10793004667ef928d6867120e628b8159a27cd4b519c78