Analysis
-
max time kernel
158s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 02:05
Static task
static1
Behavioral task
behavioral1
Sample
3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe
Resource
win10v2004-20220812-en
General
-
Target
3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe
-
Size
156KB
-
MD5
2c0cd89fc5d3e010dc5d69e310e2812e
-
SHA1
37b62fbf843dc502bfa800be18763ecbc7c491cd
-
SHA256
3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc
-
SHA512
2c4a4fbad823e19087afe3edb7977e4b552db35bb885b5222f99965ed605dd76f9fafcc33144ab4f1c9cd9df83ef53f62ae23e6dd414300290540ffe50834c7e
-
SSDEEP
1536:EZkumWuYPOBU8gRDGHPOGMmUbaxGAka+t/K9rCGaV9mw7Jqx8M+dzAbWQgRV7:VWuYAa4UbaxqkCGaVD7JqfKAbno7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hrwiug.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 hrwiug.exe -
Loads dropped DLL 2 IoCs
pid Process 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /h" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /W" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /q" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /g" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /t" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /Q" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /Z" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /k" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /d" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /c" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /R" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /l" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /z" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /V" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /T" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /U" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /w" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /r" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /C" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /A" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /M" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /F" hrwiug.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /O" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /u" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /G" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /s" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /P" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /i" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /v" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /e" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /K" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /n" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /H" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /J" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /y" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /f" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /p" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /N" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /a" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /S" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /m" hrwiug.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /Y" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /L" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /D" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /j" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /B" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /I" hrwiug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /z" 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrwiug = "C:\\Users\\Admin\\hrwiug.exe /o" hrwiug.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe 1724 hrwiug.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 1724 hrwiug.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1724 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 28 PID 1956 wrote to memory of 1724 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 28 PID 1956 wrote to memory of 1724 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 28 PID 1956 wrote to memory of 1724 1956 3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe"C:\Users\Admin\AppData\Local\Temp\3ea7df0abcb4db2189b9ae42cbf85b2d4898d19c60046ab7264798750a1099fc.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\hrwiug.exe"C:\Users\Admin\hrwiug.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5fc1227b4619cde3debe29997186d4aa1
SHA148ee4746ba3046466d79b25bebd5bfef95ade004
SHA256a7fe04e974c467d1dbb659bbbcb194c32b4a4e0385df8eb5409c11927ab9452f
SHA51278d97b31329dbf6eb970e3441c93cdc9c5d9b2c39377808896d0efd3e36781031c8b81b5a3d74525cf8df46a8c073def30fc63d5aacc660c795e1c5642518190
-
Filesize
156KB
MD5fc1227b4619cde3debe29997186d4aa1
SHA148ee4746ba3046466d79b25bebd5bfef95ade004
SHA256a7fe04e974c467d1dbb659bbbcb194c32b4a4e0385df8eb5409c11927ab9452f
SHA51278d97b31329dbf6eb970e3441c93cdc9c5d9b2c39377808896d0efd3e36781031c8b81b5a3d74525cf8df46a8c073def30fc63d5aacc660c795e1c5642518190
-
Filesize
156KB
MD5fc1227b4619cde3debe29997186d4aa1
SHA148ee4746ba3046466d79b25bebd5bfef95ade004
SHA256a7fe04e974c467d1dbb659bbbcb194c32b4a4e0385df8eb5409c11927ab9452f
SHA51278d97b31329dbf6eb970e3441c93cdc9c5d9b2c39377808896d0efd3e36781031c8b81b5a3d74525cf8df46a8c073def30fc63d5aacc660c795e1c5642518190
-
Filesize
156KB
MD5fc1227b4619cde3debe29997186d4aa1
SHA148ee4746ba3046466d79b25bebd5bfef95ade004
SHA256a7fe04e974c467d1dbb659bbbcb194c32b4a4e0385df8eb5409c11927ab9452f
SHA51278d97b31329dbf6eb970e3441c93cdc9c5d9b2c39377808896d0efd3e36781031c8b81b5a3d74525cf8df46a8c073def30fc63d5aacc660c795e1c5642518190