Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
9b778d8519139ce7f2d58bd6eb73ced4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b778d8519139ce7f2d58bd6eb73ced4.exe
Resource
win10v2004-20231222-en
General
-
Target
9b778d8519139ce7f2d58bd6eb73ced4.exe
-
Size
292KB
-
MD5
9b778d8519139ce7f2d58bd6eb73ced4
-
SHA1
916d9b985dd2406d4a12cb41e95bfa8dd371d851
-
SHA256
d4c5edf8dddcc40aa71cc1a0cb6617c4cebc08efc07dfeee44abd910d59e9c33
-
SHA512
55694a8011d9c0c2c6edcf1a479a50a5e4eb3996055cc4b4a4992682bd2f145d4252d243f6837b942f581fb0c8bab9812027eb31631eafa4c66671f900b8e69d
-
SSDEEP
3072:Cn4Od4Y9diY/OBq7CFLuupaFBzxk7c7awSZohDnjV2S8NmMx3WarRDSJOtpTxzsd:CRiYILuupszxk7USZoDnp23xmg9HtEU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9b778d8519139ce7f2d58bd6eb73ced4.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viuzeg.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 viuzeg.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /H" 9b778d8519139ce7f2d58bd6eb73ced4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /R" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /T" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /s" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /G" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /c" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /f" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /p" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /w" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /t" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /j" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /z" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /L" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /Y" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /E" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /F" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /d" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /O" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /D" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /i" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /W" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /J" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /P" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /h" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /S" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /U" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /V" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /e" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /m" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /Z" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /n" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /k" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /N" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /o" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /H" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /A" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /u" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /x" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /l" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /b" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /B" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /q" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /X" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /K" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /v" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /C" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /M" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /r" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /Q" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /y" viuzeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\viuzeg = "C:\\Users\\Admin\\viuzeg.exe /a" viuzeg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe 2144 viuzeg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 2144 viuzeg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2144 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 28 PID 1684 wrote to memory of 2144 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 28 PID 1684 wrote to memory of 2144 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 28 PID 1684 wrote to memory of 2144 1684 9b778d8519139ce7f2d58bd6eb73ced4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b778d8519139ce7f2d58bd6eb73ced4.exe"C:\Users\Admin\AppData\Local\Temp\9b778d8519139ce7f2d58bd6eb73ced4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\viuzeg.exe"C:\Users\Admin\viuzeg.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5166660eb7b5e1ad5f6cf737d6b926eb3
SHA1838c4fc6812c9650a0e34626b01fe5aa642fc4a1
SHA256a58ceb04563944d5d716dd5d08ba8fbfce0cb4cee0d24c79c21cc4789bbe0705
SHA512065d4df45526accaf1d90380edaca2ce0684e273b33f812f954dcc032648e39b4f3d813eec5e9ba6370ef10b4f7bd936a573995d4fe84599aaff6482d006c8af