Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 21:41
Static task
static1
Behavioral task
behavioral1
Sample
f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe
Resource
win10v2004-20220812-en
General
-
Target
f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe
-
Size
128KB
-
MD5
6f799fa431e75c8dce784154eb0b22ed
-
SHA1
dd5952d5d0fba83057c2cff03167c400f7d71b76
-
SHA256
f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76
-
SHA512
244011e558b15590e604056cd4a47e610227070551509bd12f8c6b21eb0c3af7676c0283b2976543c93c9ebfcabe691933050a5a97fe5df4facf408191e17abc
-
SSDEEP
3072:DSYyjLkn4keboiqIQ7Dq7E0zQLQQAEvEG:Dv4k87qIAq7E0zQLzAEh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziukuj.exe -
Executes dropped EXE 1 IoCs
pid Process 1088 ziukuj.exe -
Loads dropped DLL 2 IoCs
pid Process 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /x" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /c" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /h" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /v" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /z" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /r" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /n" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /b" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /d" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /l" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /f" ziukuj.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /g" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /o" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /q" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /n" f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /t" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /j" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /a" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /m" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /y" ziukuj.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /e" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /u" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /s" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /k" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /w" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /i" ziukuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziukuj = "C:\\Users\\Admin\\ziukuj.exe /p" ziukuj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe 1088 ziukuj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 1088 ziukuj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1088 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 27 PID 1880 wrote to memory of 1088 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 27 PID 1880 wrote to memory of 1088 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 27 PID 1880 wrote to memory of 1088 1880 f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe"C:\Users\Admin\AppData\Local\Temp\f76fdfe53aa1435b9773e3893d70b71665926c1c60aa2b06725961d62a7fec76.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\ziukuj.exe"C:\Users\Admin\ziukuj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD54ab6dadb448a9ff8c4575df71580e7a9
SHA1cac115f125525c27d43d4fba1c800e3fd9f68ea4
SHA25641bf06b7d3b3b81d82d94bbbf7ec4ac485c3b2ad7107dee66d5ab5196bda9849
SHA51233ae2747620ad91788fa101567e46479775d138ab33bf3cacb87571b955f0b907c82b724a21db169f6a9aec3f5ee05a877b0859bf10d136a1142036951b202b3
-
Filesize
128KB
MD54ab6dadb448a9ff8c4575df71580e7a9
SHA1cac115f125525c27d43d4fba1c800e3fd9f68ea4
SHA25641bf06b7d3b3b81d82d94bbbf7ec4ac485c3b2ad7107dee66d5ab5196bda9849
SHA51233ae2747620ad91788fa101567e46479775d138ab33bf3cacb87571b955f0b907c82b724a21db169f6a9aec3f5ee05a877b0859bf10d136a1142036951b202b3
-
Filesize
128KB
MD54ab6dadb448a9ff8c4575df71580e7a9
SHA1cac115f125525c27d43d4fba1c800e3fd9f68ea4
SHA25641bf06b7d3b3b81d82d94bbbf7ec4ac485c3b2ad7107dee66d5ab5196bda9849
SHA51233ae2747620ad91788fa101567e46479775d138ab33bf3cacb87571b955f0b907c82b724a21db169f6a9aec3f5ee05a877b0859bf10d136a1142036951b202b3
-
Filesize
128KB
MD54ab6dadb448a9ff8c4575df71580e7a9
SHA1cac115f125525c27d43d4fba1c800e3fd9f68ea4
SHA25641bf06b7d3b3b81d82d94bbbf7ec4ac485c3b2ad7107dee66d5ab5196bda9849
SHA51233ae2747620ad91788fa101567e46479775d138ab33bf3cacb87571b955f0b907c82b724a21db169f6a9aec3f5ee05a877b0859bf10d136a1142036951b202b3