Analysis
-
max time kernel
151s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe
Resource
win10v2004-20220812-en
General
-
Target
db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe
-
Size
112KB
-
MD5
6033f9d6ecea87e26cc8f9d1d48b69b0
-
SHA1
0a449250747c479a6e660ac54088910c68f00727
-
SHA256
db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1
-
SHA512
84ac39fcf5c4042155d501535aaff15a9f4fa68c638fe20b1f894f70aee57d1f1803e13f32025f2ae482546e5b7bb7adc88b616202248f8486c515dc67ab21c0
-
SSDEEP
3072:4sE12Ell3J1uouicVJ1tSHYz7e47ew3D4:it/vDcL1oHn5w0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" buioqix.exe -
Executes dropped EXE 2 IoCs
pid Process 1040 buioqix.exe 1868 buioqix.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /p" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /z" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /a" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /m" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /k" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /n" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /j" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /i" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /x" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /g" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /e" buioqix.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /o" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /s" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /t" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /y" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /l" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /k" db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /b" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /v" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /c" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /r" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /d" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /u" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /q" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /f" buioqix.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /w" buioqix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\buioqix = "C:\\Users\\Admin\\buioqix.exe /h" buioqix.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Users\Admin\c\autorun.inf buioqix.exe File opened for modification C:\Users\Admin\c\autorun.inf buioqix.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1504 set thread context of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1040 set thread context of 1868 1040 buioqix.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe 1868 buioqix.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 1040 buioqix.exe 1868 buioqix.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1504 wrote to memory of 1680 1504 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 28 PID 1680 wrote to memory of 1040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 29 PID 1680 wrote to memory of 1040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 29 PID 1680 wrote to memory of 1040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 29 PID 1680 wrote to memory of 1040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 29 PID 1680 wrote to memory of 2040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 30 PID 1680 wrote to memory of 2040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 30 PID 1680 wrote to memory of 2040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 30 PID 1680 wrote to memory of 2040 1680 db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe 30 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31 PID 1040 wrote to memory of 1868 1040 buioqix.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe"C:\Users\Admin\AppData\Local\Temp\db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1.exe782⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\buioqix.exe"C:\Users\Admin\buioqix.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\buioqix.exe784⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
-
C:\Windows\SysWOW64\PhotoScreensaver.scr"C:\Windows\System32\PhotoScreensaver.scr" /S3⤵PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD56033f9d6ecea87e26cc8f9d1d48b69b0
SHA10a449250747c479a6e660ac54088910c68f00727
SHA256db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1
SHA51284ac39fcf5c4042155d501535aaff15a9f4fa68c638fe20b1f894f70aee57d1f1803e13f32025f2ae482546e5b7bb7adc88b616202248f8486c515dc67ab21c0
-
Filesize
112KB
MD56033f9d6ecea87e26cc8f9d1d48b69b0
SHA10a449250747c479a6e660ac54088910c68f00727
SHA256db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1
SHA51284ac39fcf5c4042155d501535aaff15a9f4fa68c638fe20b1f894f70aee57d1f1803e13f32025f2ae482546e5b7bb7adc88b616202248f8486c515dc67ab21c0
-
Filesize
112KB
MD56033f9d6ecea87e26cc8f9d1d48b69b0
SHA10a449250747c479a6e660ac54088910c68f00727
SHA256db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1
SHA51284ac39fcf5c4042155d501535aaff15a9f4fa68c638fe20b1f894f70aee57d1f1803e13f32025f2ae482546e5b7bb7adc88b616202248f8486c515dc67ab21c0
-
Filesize
112KB
MD56033f9d6ecea87e26cc8f9d1d48b69b0
SHA10a449250747c479a6e660ac54088910c68f00727
SHA256db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1
SHA51284ac39fcf5c4042155d501535aaff15a9f4fa68c638fe20b1f894f70aee57d1f1803e13f32025f2ae482546e5b7bb7adc88b616202248f8486c515dc67ab21c0
-
Filesize
112KB
MD56033f9d6ecea87e26cc8f9d1d48b69b0
SHA10a449250747c479a6e660ac54088910c68f00727
SHA256db164258649dd46302a7a4271c5e71bb07e4fde0b722333a19eb6ebf754b64b1
SHA51284ac39fcf5c4042155d501535aaff15a9f4fa68c638fe20b1f894f70aee57d1f1803e13f32025f2ae482546e5b7bb7adc88b616202248f8486c515dc67ab21c0