Analysis
-
max time kernel
1800s -
max time network
1496s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/05/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
Vobfus W32-worm.zip
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
Worm.Win32_Vobfus.AC.exe
Resource
win11-20240508-en
General
-
Target
Worm.Win32_Vobfus.AC.exe
-
Size
53KB
-
MD5
3d314beead79c0ed05dc7d3ffc399b36
-
SHA1
a75813a0cf5f380cb87f5bdd230502a6b53157fe
-
SHA256
793f93bed1d221e899cdeacc07ccd466c4ed5807835ef646006fe19e16685f18
-
SHA512
900091fd38d0f2960e17a7667f995c9a034208b5a07d4664472f63af6e8b9557925dfbbe07312de7a703d08528a03a67fa4e4690cd927f377aae80a3fe5aaf92
-
SSDEEP
1536:vNZg8r8QJYYS7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:9YYSJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" weuiyop.exe -
Executes dropped EXE 1 IoCs
pid Process 4008 weuiyop.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\weuiyop = "C:\\Users\\Admin\\weuiyop.exe" weuiyop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe 4008 weuiyop.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1176 Worm.Win32_Vobfus.AC.exe 4008 weuiyop.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4008 1176 Worm.Win32_Vobfus.AC.exe 82 PID 1176 wrote to memory of 4008 1176 Worm.Win32_Vobfus.AC.exe 82 PID 1176 wrote to memory of 4008 1176 Worm.Win32_Vobfus.AC.exe 82 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79 PID 4008 wrote to memory of 1176 4008 weuiyop.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Worm.Win32_Vobfus.AC.exe"C:\Users\Admin\AppData\Local\Temp\Worm.Win32_Vobfus.AC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\weuiyop.exe"C:\Users\Admin\weuiyop.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD538ebf58136b3a273b9661197b1ed92d1
SHA1efa4fe955dd0974efe7a112f19eef6e9c2bbbf05
SHA2562960a3ceecc625895589eb820d32aa63c6d858ff0cd994f68e289d02fa624828
SHA5124910631ead42afb7e94e04adf9cb89a9a9135fdce49d237babfba840e6ecb488e062f21bcefe77c1b614b167b6f8d64b07ff18746596081906e3a743f3219fac