Analysis
-
max time kernel
153s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe
Resource
win10v2004-20220812-en
General
-
Target
96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe
-
Size
116KB
-
MD5
6442c026152250dcb2d7f29fde93da7f
-
SHA1
24a0ee00f31808913c143e37ba292944b4d052f4
-
SHA256
96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4
-
SHA512
7befcc0bcaf94be1a5f4efa4e2b6827c7cfe9c56ced0f196dfc72b84d29391349e1b2ff7048065f7e1d8cab2258a41f4b0feb6777acfba0d9c46d20e6d4ca80d
-
SSDEEP
1536:Km0TcIW9MtpJUlUk+++pZgGEbplftRkDhfdxoMqYjFe1JsW0KuwOZZZZH1gMiZI:70T2MBUlUIRsjsh0xdZZZZVgu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juoawap.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 juoawap.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /r" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /d" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /x" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /m" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /g" juoawap.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /p" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /a" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /z" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /o" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /w" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /u" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /b" 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /q" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /k" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /n" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /t" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /e" juoawap.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /y" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /l" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /f" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /i" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /b" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /h" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /v" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /j" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /s" juoawap.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoawap = "C:\\Users\\Admin\\juoawap.exe /c" juoawap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe 2116 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe 2128 juoawap.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2116 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe 2128 juoawap.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2128 2116 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe 80 PID 2116 wrote to memory of 2128 2116 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe 80 PID 2116 wrote to memory of 2128 2116 96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe"C:\Users\Admin\AppData\Local\Temp\96c870bdf8f93adc99e65a14c09cd759dcd039333ce06b486d5e7411eb601ee4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\juoawap.exe"C:\Users\Admin\juoawap.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5cc33dbf13549f0c2e82ffd5aed1705b7
SHA1338785698163cbd2fd2d12d71412dbb43897fe82
SHA2563db34572f4650974c87359d410acea9ad4fc0ba6e9d81df8b0fb3f2dfde996e6
SHA5121260ce5bfa9e4bef8045428ad55d18e6510c7eda3d957f9e20959336e022e6b2ceaecc89d983719667fa7c0a8c50a9505db2894673d0200299f793385c2cf5fa
-
Filesize
116KB
MD5cc33dbf13549f0c2e82ffd5aed1705b7
SHA1338785698163cbd2fd2d12d71412dbb43897fe82
SHA2563db34572f4650974c87359d410acea9ad4fc0ba6e9d81df8b0fb3f2dfde996e6
SHA5121260ce5bfa9e4bef8045428ad55d18e6510c7eda3d957f9e20959336e022e6b2ceaecc89d983719667fa7c0a8c50a9505db2894673d0200299f793385c2cf5fa