Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe
Resource
win10v2004-20220901-en
General
-
Target
5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe
-
Size
136KB
-
MD5
3e7e2f2fc4d26139af9dddc06e5312da
-
SHA1
932db87f895f7f50da1b1a657e3f2f53d61afdcf
-
SHA256
5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515
-
SHA512
71ad401dc07920131debefa17a39e97e7dd3dd137b12eb5f136147af6c15c3a62e73f219fe889dd7a0e44c62da7138bace837f99d65389094caa7f061317158b
-
SSDEEP
3072:UyaRRG/J9t538E6tZqAwZh5dKzio3CfNynXp5ucK1FaOaB0W+A:7a9kAwWTSW+A
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xxyuj.exe -
Executes dropped EXE 1 IoCs
pid Process 1028 xxyuj.exe -
Loads dropped DLL 2 IoCs
pid Process 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /y" xxyuj.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /v" 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /t" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /j" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /v" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /m" xxyuj.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /b" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /d" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /k" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /c" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /p" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /g" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /l" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /z" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /i" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /s" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /f" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /a" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /h" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /n" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /x" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /u" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /e" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /q" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /o" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /r" xxyuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xxyuj = "C:\\Users\\Admin\\xxyuj.exe /w" xxyuj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe 1028 xxyuj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 1028 xxyuj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1028 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 27 PID 1516 wrote to memory of 1028 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 27 PID 1516 wrote to memory of 1028 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 27 PID 1516 wrote to memory of 1028 1516 5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe"C:\Users\Admin\AppData\Local\Temp\5a41787ec3d1271781af1af230678019018dd160328dec8303f8a28ca9c84515.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\xxyuj.exe"C:\Users\Admin\xxyuj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5f991a69b854ec5f744b7ee248fac86c6
SHA1e199aab3cca7613802ea2d01ebd86e0a2d4a70aa
SHA256fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65
SHA5128bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d
-
Filesize
136KB
MD5f991a69b854ec5f744b7ee248fac86c6
SHA1e199aab3cca7613802ea2d01ebd86e0a2d4a70aa
SHA256fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65
SHA5128bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d
-
Filesize
136KB
MD5f991a69b854ec5f744b7ee248fac86c6
SHA1e199aab3cca7613802ea2d01ebd86e0a2d4a70aa
SHA256fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65
SHA5128bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d
-
Filesize
136KB
MD5f991a69b854ec5f744b7ee248fac86c6
SHA1e199aab3cca7613802ea2d01ebd86e0a2d4a70aa
SHA256fbc6385335ecda70813b0806637e80863a751e97c61ce61f728e378a1a4d5f65
SHA5128bfec2d16a5296c22ad2fea451ff38b482a10c099f2302424875a6591ce3142726318f4af6fc16fb9e1b4974d1051bcdf151862cbd8d45b695b9a83a60d6bc3d