Analysis

  • max time kernel
    1800s
  • max time network
    1496s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/05/2024, 14:54

General

  • Target

    Worm.Win32_Vobfus.AC.exe

  • Size

    53KB

  • MD5

    3d314beead79c0ed05dc7d3ffc399b36

  • SHA1

    a75813a0cf5f380cb87f5bdd230502a6b53157fe

  • SHA256

    793f93bed1d221e899cdeacc07ccd466c4ed5807835ef646006fe19e16685f18

  • SHA512

    900091fd38d0f2960e17a7667f995c9a034208b5a07d4664472f63af6e8b9557925dfbbe07312de7a703d08528a03a67fa4e4690cd927f377aae80a3fe5aaf92

  • SSDEEP

    1536:vNZg8r8QJYYS7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:9YYSJJjmLM3zRJWZsXy4Jt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Worm.Win32_Vobfus.AC.exe
    "C:\Users\Admin\AppData\Local\Temp\Worm.Win32_Vobfus.AC.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\weuiyop.exe
      "C:\Users\Admin\weuiyop.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\weuiyop.exe

    Filesize

    53KB

    MD5

    38ebf58136b3a273b9661197b1ed92d1

    SHA1

    efa4fe955dd0974efe7a112f19eef6e9c2bbbf05

    SHA256

    2960a3ceecc625895589eb820d32aa63c6d858ff0cd994f68e289d02fa624828

    SHA512

    4910631ead42afb7e94e04adf9cb89a9a9135fdce49d237babfba840e6ecb488e062f21bcefe77c1b614b167b6f8d64b07ff18746596081906e3a743f3219fac

  • memory/1176-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1176-37-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4008-34-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4008-38-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB