Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 14:26
Behavioral task
behavioral1
Sample
b8f3af9de7b3a6bbdf813b87160295a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8f3af9de7b3a6bbdf813b87160295a8.exe
Resource
win10v2004-20240226-en
General
-
Target
b8f3af9de7b3a6bbdf813b87160295a8.exe
-
Size
297KB
-
MD5
b8f3af9de7b3a6bbdf813b87160295a8
-
SHA1
b92fc9ec19246d62fcb8e4ff4af89fc8ada509e3
-
SHA256
21817cd11609a602c97437f50b37c037ac8fdf1ab2febbe742d3d271b44f2ab7
-
SHA512
5edd4aae61af8d7643c6fd4275481eb09bf2218c7ab4e972a540d3b2441f4fb74db37375fdde433a0ccc680df85091cf368d182d044d727d0802f360e655601a
-
SSDEEP
6144:HTdiRzRz45GumLNGJVUYc8r10tAcKovjEqMeM/xmosN5:zdaOGumLNGoYc85Tc5vjMXB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation b8f3af9de7b3a6bbdf813b87160295a8.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 pviever.exe -
resource yara_rule behavioral2/memory/4164-0-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/files/0x000c00000002312e-6.dat upx behavioral2/memory/4164-11-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/1308-10-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/1308-14-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/1308-15-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral2/memory/1308-16-0x0000000000400000-0x00000000004CB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PViever = "\"C:\\Program Files\\PViever\\pviever.exe\" hide" b8f3af9de7b3a6bbdf813b87160295a8.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\PViever\pviever.exe b8f3af9de7b3a6bbdf813b87160295a8.exe File created C:\Program Files\PViever\uin.txt pviever.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 pviever.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff pviever.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots pviever.exe Set value (data) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 pviever.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 pviever.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1308 pviever.exe 1308 pviever.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4164 wrote to memory of 1308 4164 b8f3af9de7b3a6bbdf813b87160295a8.exe 88 PID 4164 wrote to memory of 1308 4164 b8f3af9de7b3a6bbdf813b87160295a8.exe 88 PID 4164 wrote to memory of 1308 4164 b8f3af9de7b3a6bbdf813b87160295a8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f3af9de7b3a6bbdf813b87160295a8.exe"C:\Users\Admin\AppData\Local\Temp\b8f3af9de7b3a6bbdf813b87160295a8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files\PViever\pviever.exe"C:\Program Files\PViever\pviever.exe" hide 100002⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5b8f3af9de7b3a6bbdf813b87160295a8
SHA1b92fc9ec19246d62fcb8e4ff4af89fc8ada509e3
SHA25621817cd11609a602c97437f50b37c037ac8fdf1ab2febbe742d3d271b44f2ab7
SHA5125edd4aae61af8d7643c6fd4275481eb09bf2218c7ab4e972a540d3b2441f4fb74db37375fdde433a0ccc680df85091cf368d182d044d727d0802f360e655601a