Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 14:40

General

  • Target

    c763d4e15f8c17fef4f48f35d1673a80N.exe

  • Size

    216KB

  • MD5

    c763d4e15f8c17fef4f48f35d1673a80

  • SHA1

    057e91d04050d415295f241bd9e174a3bf637da0

  • SHA256

    ac2ad40f5a678f062a71e22475b34c701489ba86d60f857bc58114fcda3551cb

  • SHA512

    be2227cd793e41928f7d1336eecfcd34ae9bafaa7bc34f831d4aa668393e7ea88c42d16d9962b75bd35ca3a685bf78f0a8fe96aca783b71ed8bd6d9d5dfa9250

  • SSDEEP

    3072:nYjaMKTuxxnM3/7eFE+S2/goM2IFNGzBkl9s7Y:Yn/nM36q+VM2CWs9z

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c763d4e15f8c17fef4f48f35d1673a80N.exe
    "C:\Users\Admin\AppData\Local\Temp\c763d4e15f8c17fef4f48f35d1673a80N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\wuuvoe.exe
      "C:\Users\Admin\wuuvoe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\wuuvoe.exe

    Filesize

    216KB

    MD5

    976804d6d36d2d9c741ab9a1cb01f4fd

    SHA1

    60c6b3748d430c058c45901e0e24444313d5dd82

    SHA256

    7896fd46788ee7aa9c258cf3ad397d34efdbfd7037899729bd4b4c9e66536389

    SHA512

    0e669835f1caa13224da36183f88b01852706fc3a3c468ea05b1b529f15d737b9bfb0a28fbe0b068271925ee0d5918229439f059c227f1e1819151706115522b

  • memory/2292-0-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2292-13-0x00000000031E0000-0x000000000322C000-memory.dmp

    Filesize

    304KB

  • memory/2292-14-0x00000000031E0000-0x000000000322C000-memory.dmp

    Filesize

    304KB

  • memory/2292-20-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2292-21-0x00000000031E0000-0x000000000322C000-memory.dmp

    Filesize

    304KB

  • memory/2940-16-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2940-22-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB