Analysis
-
max time kernel
190s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe
Resource
win10v2004-20220812-en
General
-
Target
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe
-
Size
312KB
-
MD5
46e30c8e93a936140c3c543aba3f9e71
-
SHA1
813ab8fa8ea3d9a9669bb318a6fd87534c175d4f
-
SHA256
7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16
-
SHA512
c27e99b4dbaf6110ecf4edf068561e3702b943d90a994e67326a9f1c7fbdd533d883e1091926f2b97203c907b9c62c9129bf73fdf5f3eef41369e43179f52cb2
-
SSDEEP
6144:4Abc0f7XP+g3AGJpWVzugs7PRHeEgRK/fObT/bGiJKv6R7MkZ4lUr8W9HuOGKqvs:zw27/XvLWpu/eEgRK/fObT/bGiJlMkZ9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muurao.exe -
Executes dropped EXE 1 IoCs
pid Process 3680 muurao.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /d" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /v" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /Y" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /T" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /L" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /K" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /y" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /l" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /J" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /e" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /u" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /R" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /U" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /s" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /P" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /t" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /c" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /G" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /n" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /B" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /z" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /Z" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /N" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /O" 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /Q" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /O" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /j" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /S" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /k" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /x" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /V" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /o" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /C" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /m" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /q" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /p" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /f" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /h" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /H" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /I" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /a" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /D" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /E" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /A" muurao.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /i" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /W" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /b" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /X" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /M" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /r" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /F" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /g" muurao.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muurao = "C:\\Users\\Admin\\muurao.exe /w" muurao.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1288 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 1288 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe 3680 muurao.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1288 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 3680 muurao.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1288 wrote to memory of 3680 1288 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 82 PID 1288 wrote to memory of 3680 1288 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 82 PID 1288 wrote to memory of 3680 1288 7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe"C:\Users\Admin\AppData\Local\Temp\7b5477aedf8ca5f11cf0db66fcc580cdd253ff38ec103f4dac6a6a917d42fa16.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\muurao.exe"C:\Users\Admin\muurao.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5c8e8e605e57271f4117308adb8ef9323
SHA11591ecf04b8f0f1a67545e5c03c0bdd5caf99204
SHA25680eed06029c167e2a6e3471203d148aafd03a615ca6fd07066fa8c04077e8036
SHA5127da853d8dcb28542a1aafec9886d3260ed3d61a9fa53754a4d60c0cd0806e8905fe233d53df56f2da5a7fa9e2063c0df3ccec27078117944c7d9ca312f5f661d
-
Filesize
312KB
MD5c8e8e605e57271f4117308adb8ef9323
SHA11591ecf04b8f0f1a67545e5c03c0bdd5caf99204
SHA25680eed06029c167e2a6e3471203d148aafd03a615ca6fd07066fa8c04077e8036
SHA5127da853d8dcb28542a1aafec9886d3260ed3d61a9fa53754a4d60c0cd0806e8905fe233d53df56f2da5a7fa9e2063c0df3ccec27078117944c7d9ca312f5f661d