Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe
Resource
win10v2004-20220812-en
General
-
Target
dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe
-
Size
112KB
-
MD5
5591bdaa0de468c24b130f10faa3e52c
-
SHA1
e6ff9a3216b7fba10276edf928002fd5aa70003a
-
SHA256
dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156
-
SHA512
06a9c102768e04a9d581296324daf6fc4536887b3136aa4ab9d2bc319855597f7ea773b3e0e6b58c2bf121128135e056735e08603e1e7f9170b16ccc143beaac
-
SSDEEP
3072:NHqhxJXUSQSOGWANT2TZbCiPMBl2H+Qp51+9DU9wsaCpU9kXoAo6DSES2AE4mc0v:NYXUSHOGWANT2TZ+iPMf2H+Q31+9DU92
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beezuun.exe -
Executes dropped EXE 1 IoCs
pid Process 1240 beezuun.exe -
Loads dropped DLL 2 IoCs
pid Process 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /F" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /x" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /a" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /W" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /d" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /U" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /c" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /v" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /n" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /X" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /A" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /G" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /p" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /N" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /b" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /C" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /B" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /L" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /Q" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /R" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /j" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /q" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /u" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /l" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /k" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /g" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /S" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /i" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /E" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /Y" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /P" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /z" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /m" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /V" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /M" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /K" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /T" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /Z" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /r" beezuun.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /y" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /I" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /t" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /e" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /w" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /H" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /o" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /J" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /s" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /D" beezuun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\beezuun = "C:\\Users\\Admin\\beezuun.exe /O" beezuun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe 1240 beezuun.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe 1240 beezuun.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 1240 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe 28 PID 832 wrote to memory of 1240 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe 28 PID 832 wrote to memory of 1240 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe 28 PID 832 wrote to memory of 1240 832 dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe"C:\Users\Admin\AppData\Local\Temp\dd0818d0deda5452f02cba4a90e5716fc1e042fa0dc4c44ee05ef6e62e576156.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\beezuun.exeC:\Users\Admin\beezuun.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5ecd64622d5cae6cafeb5117bb897184a
SHA10c118d797feeb540a65cbe1d12bf00a3fb22cc83
SHA25621d288617fbf610a98c5158ffc91d7500c5b94e4fef5e8403ceebf74068fb1c7
SHA512cb3487d02eb3f4918ea2edc11f5f8d1edc8da4bb612c2736f2e86ffc268c21fc0d4048b67fad4072a8167d37a23e98f18681d05924f2ba3edc2ddf8bb6b9c5c6
-
Filesize
112KB
MD5ecd64622d5cae6cafeb5117bb897184a
SHA10c118d797feeb540a65cbe1d12bf00a3fb22cc83
SHA25621d288617fbf610a98c5158ffc91d7500c5b94e4fef5e8403ceebf74068fb1c7
SHA512cb3487d02eb3f4918ea2edc11f5f8d1edc8da4bb612c2736f2e86ffc268c21fc0d4048b67fad4072a8167d37a23e98f18681d05924f2ba3edc2ddf8bb6b9c5c6
-
Filesize
112KB
MD5ecd64622d5cae6cafeb5117bb897184a
SHA10c118d797feeb540a65cbe1d12bf00a3fb22cc83
SHA25621d288617fbf610a98c5158ffc91d7500c5b94e4fef5e8403ceebf74068fb1c7
SHA512cb3487d02eb3f4918ea2edc11f5f8d1edc8da4bb612c2736f2e86ffc268c21fc0d4048b67fad4072a8167d37a23e98f18681d05924f2ba3edc2ddf8bb6b9c5c6
-
Filesize
112KB
MD5ecd64622d5cae6cafeb5117bb897184a
SHA10c118d797feeb540a65cbe1d12bf00a3fb22cc83
SHA25621d288617fbf610a98c5158ffc91d7500c5b94e4fef5e8403ceebf74068fb1c7
SHA512cb3487d02eb3f4918ea2edc11f5f8d1edc8da4bb612c2736f2e86ffc268c21fc0d4048b67fad4072a8167d37a23e98f18681d05924f2ba3edc2ddf8bb6b9c5c6