Analysis
-
max time kernel
156s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe
Resource
win10v2004-20220812-en
General
-
Target
20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe
-
Size
124KB
-
MD5
fe5d48d60fc5084976230c74f3057fd8
-
SHA1
f88dcc9664948bb47707041c2ce18aed58001b9c
-
SHA256
20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2
-
SHA512
2f80dfa8f203ed503797b7ddc24c230c5dca0425e879f0a38b6b8999586191700a368f60038e8fb388e562967815e68c6e24e56708065bc9bf22e8dc417a5092
-
SSDEEP
1536:SotkjdTQ6ecmU0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VeRPNeG0h/y:pkjC6ecmU0GgAT9QIq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maovu.exe -
Executes dropped EXE 1 IoCs
pid Process 2408 maovu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /B" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /f" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /L" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /i" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /P" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /N" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /j" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /S" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /K" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /r" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /V" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /e" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /w" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /c" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /A" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /z" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /d" 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /a" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /C" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /O" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /Z" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /s" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /X" maovu.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /M" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /x" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /d" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /W" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /Q" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /p" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /E" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /o" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /n" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /R" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /T" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /l" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /q" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /U" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /b" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /u" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /I" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /D" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /G" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /t" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /h" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /J" maovu.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /m" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /y" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /k" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /g" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /Y" maovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maovu = "C:\\Users\\Admin\\maovu.exe /H" maovu.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B4EC9205-2623-4B60-8290-E5EE40583CF0}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FA970F1D-4D4C-4998-8564-AEA3CBB90AEB}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe 2228 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe 2408 maovu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2228 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe 2408 maovu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2408 2228 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe 75 PID 2228 wrote to memory of 2408 2228 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe 75 PID 2228 wrote to memory of 2408 2228 20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe"C:\Users\Admin\AppData\Local\Temp\20c35c9a6787dcfabb6ff6916b51888101c9ec3e38375ee21b304be7d7056ed2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\maovu.exe"C:\Users\Admin\maovu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD59c34ebb53a8650be679bd51787ba0ea5
SHA1d7f5360f3b58aed93ab353d734f5b4193580ec6c
SHA25687b954ada981a727e1954de42ea7b883f579035af8740087855c5acc99cf6e81
SHA512cce6a79295ba85ddd28df2f7cf078795f7c7d7ac5c0f0bd8954a05ff44765e12df5257e188e272c0df2c1e3d583df6ffc90a79c39a562944896d29f0c95821e2
-
Filesize
124KB
MD59c34ebb53a8650be679bd51787ba0ea5
SHA1d7f5360f3b58aed93ab353d734f5b4193580ec6c
SHA25687b954ada981a727e1954de42ea7b883f579035af8740087855c5acc99cf6e81
SHA512cce6a79295ba85ddd28df2f7cf078795f7c7d7ac5c0f0bd8954a05ff44765e12df5257e188e272c0df2c1e3d583df6ffc90a79c39a562944896d29f0c95821e2