Analysis
-
max time kernel
300s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-09-2022 11:52
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20220812-en
General
-
Target
2.exe
-
Size
1.3MB
-
MD5
5110f6802a9e7f1eaba4dd916f80b2a0
-
SHA1
4c3b319e1f68cbde0991d352a9156b1932264573
-
SHA256
50b2b6803b44585b6b2b504af9b0102788c7195c97fc61ff3c1a14747de41113
-
SHA512
ab25bb827c7299e4823595a1b6e7d3a2a2ade89a4485549d68c1e24644cdc6e015a0dff4e1cb5674a66aff22c1988aebc3253c3b786861f4c03c8006f5d2c848
-
SSDEEP
24576:qDv3/Mg+ReqnEHiwf29hq6ik68o62xzdJ8A52QqW7I2LOQSQ33R0Z:qERPwf2WZ18o62xzv8VmF
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MoUSO.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 MoUSO.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MoUSO.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine 2.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine MoUSO.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 360 2.exe 1632 MoUSO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 324 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 360 2.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe 1632 MoUSO.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 360 wrote to memory of 324 360 2.exe 28 PID 360 wrote to memory of 324 360 2.exe 28 PID 360 wrote to memory of 324 360 2.exe 28 PID 360 wrote to memory of 324 360 2.exe 28 PID 1764 wrote to memory of 1632 1764 taskeng.exe 31 PID 1764 wrote to memory of 1632 1764 taskeng.exe 31 PID 1764 wrote to memory of 1632 1764 taskeng.exe 31 PID 1764 wrote to memory of 1632 1764 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"2⤵
- Creates scheduled task(s)
PID:324
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0C5FEA86-9FD5-4929-BC51-16B17DB47FFB} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55110f6802a9e7f1eaba4dd916f80b2a0
SHA14c3b319e1f68cbde0991d352a9156b1932264573
SHA25650b2b6803b44585b6b2b504af9b0102788c7195c97fc61ff3c1a14747de41113
SHA512ab25bb827c7299e4823595a1b6e7d3a2a2ade89a4485549d68c1e24644cdc6e015a0dff4e1cb5674a66aff22c1988aebc3253c3b786861f4c03c8006f5d2c848
-
Filesize
1.3MB
MD55110f6802a9e7f1eaba4dd916f80b2a0
SHA14c3b319e1f68cbde0991d352a9156b1932264573
SHA25650b2b6803b44585b6b2b504af9b0102788c7195c97fc61ff3c1a14747de41113
SHA512ab25bb827c7299e4823595a1b6e7d3a2a2ade89a4485549d68c1e24644cdc6e015a0dff4e1cb5674a66aff22c1988aebc3253c3b786861f4c03c8006f5d2c848