Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 04:09

General

  • Target

    dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59.exe

  • Size

    156KB

  • MD5

    cf1e22d4b427f32f2e0812aa3e8bb25a

  • SHA1

    6277f06792358cc6f0c9c0a34d7dd91481ad2d8a

  • SHA256

    dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59

  • SHA512

    8f139da7f5d79149551347d53cdce13c0ac3b0acd6071ccd4075aaab47318f38ea3ad42137baf7cc1a6c281638716890cddc7c088f10e4e2f285a5005864c683

  • SSDEEP

    3072:A0O2q9j5h3QKWXXWXG8FF7K+AmsgE5kEZZZy6x84JE5j4oQ:C9jX3QKKXWFFF7KlgaSPd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59.exe
    "C:\Users\Admin\AppData\Local\Temp\dc407a7548630c13113d468564f7f7a2bf19cd2c83ff58552f3b4778f4bfdc59.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\vuusoet.exe
      "C:\Users\Admin\vuusoet.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\vuusoet.exe

    Filesize

    156KB

    MD5

    16da8a4a11ff4cbbf428d7056b8796fb

    SHA1

    2be8ac3b52ff8d9bffab84eed3768a3f1e31ee72

    SHA256

    655dae3993eb78109ccb741070b2aca5549172ee558596a1cca3617da0a6ea5e

    SHA512

    c028fe3a11a71085107ac4ff89254607ac3e8f1a760d170165dcba87b3a0ff1d22eb1c286299475d534c901f8f29be7d0678711a52458879daceb1c745d4e9b6