Analysis
-
max time kernel
149s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe
Resource
win10v2004-20220901-en
General
-
Target
6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe
-
Size
244KB
-
MD5
7c80c170b61eacf84724f98524c70b50
-
SHA1
95256f2c619aa390fd3fadef71a90503f654a64e
-
SHA256
6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0
-
SHA512
3f57ae11940c52ddd2a94d57e172874a5f4711fdcffa348fcf8bf7c13ce7bb6b60475190a20a2229665345b027e5bda93553ac13783b90df2a46b1cf1a06f49f
-
SSDEEP
3072:E8bn4GXuWIKC2JfOj//FfyF5Hdreo1ygiTYvk6CAxD34:EiZCcfg/dfyFHreo1ygiub
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" junuw.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 junuw.exe -
Loads dropped DLL 2 IoCs
pid Process 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /c" 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /u" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /c" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /j" junuw.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /m" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /t" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /l" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /a" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /k" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /g" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /d" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /v" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /o" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /y" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /s" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /x" junuw.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /f" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /n" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /r" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /q" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /p" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /e" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /h" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /i" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /w" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /z" junuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\junuw = "C:\\Users\\Admin\\junuw.exe /b" junuw.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum junuw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 junuw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe 2036 junuw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 2036 junuw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2036 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 27 PID 1672 wrote to memory of 2036 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 27 PID 1672 wrote to memory of 2036 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 27 PID 1672 wrote to memory of 2036 1672 6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe"C:\Users\Admin\AppData\Local\Temp\6e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\junuw.exe"C:\Users\Admin\junuw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD57c80c170b61eacf84724f98524c70b50
SHA195256f2c619aa390fd3fadef71a90503f654a64e
SHA2566e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0
SHA5123f57ae11940c52ddd2a94d57e172874a5f4711fdcffa348fcf8bf7c13ce7bb6b60475190a20a2229665345b027e5bda93553ac13783b90df2a46b1cf1a06f49f
-
Filesize
244KB
MD57c80c170b61eacf84724f98524c70b50
SHA195256f2c619aa390fd3fadef71a90503f654a64e
SHA2566e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0
SHA5123f57ae11940c52ddd2a94d57e172874a5f4711fdcffa348fcf8bf7c13ce7bb6b60475190a20a2229665345b027e5bda93553ac13783b90df2a46b1cf1a06f49f
-
Filesize
244KB
MD57c80c170b61eacf84724f98524c70b50
SHA195256f2c619aa390fd3fadef71a90503f654a64e
SHA2566e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0
SHA5123f57ae11940c52ddd2a94d57e172874a5f4711fdcffa348fcf8bf7c13ce7bb6b60475190a20a2229665345b027e5bda93553ac13783b90df2a46b1cf1a06f49f
-
Filesize
244KB
MD57c80c170b61eacf84724f98524c70b50
SHA195256f2c619aa390fd3fadef71a90503f654a64e
SHA2566e293586ccfa87b5df40cc1324e230818ef494261a1c58135f6481df11320fb0
SHA5123f57ae11940c52ddd2a94d57e172874a5f4711fdcffa348fcf8bf7c13ce7bb6b60475190a20a2229665345b027e5bda93553ac13783b90df2a46b1cf1a06f49f