Analysis
-
max time kernel
300s -
max time network
253s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-10-2022 03:48
Behavioral task
behavioral1
Sample
37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe
Resource
win7-20220812-en
General
-
Target
37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe
-
Size
7.1MB
-
MD5
aa9aeef0c7f798b7a2304a36f019a4d5
-
SHA1
53e215bae2435c8d513dc05e4b759b432b732b37
-
SHA256
37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402
-
SHA512
01cb47ed8569519ee56b30c81baceef5ffb6c5278caff6cf0eb8024dd7dd06a609274a827fdd79d028462f22793ef6f3d79f0b3eed1aa4053a190edbb7e4e014
-
SSDEEP
196608:qjThv/HxOgwX5aTCjgegUseCu55hArH1u7VNRWiM:qjlHID5AogeEe/Hh8HA7EiM
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=finarnw
D5c27bWU8dvgdayPUMzKbc75CmsD9aUSDw
r4RkKWPKszhkZVTtXGBDNyrzcDPjpcnGNp
0xC4b495c6ef4B61d5757a1e78dE22edC315867C84
XshLZA5C9odmaiEfopX5DYvwMbnM4hqCME
TT7mceJ6BNhTPFqpaBy1ND1CWGwaGeqhpx
t1MrxfTEGEZioK7qjcDd48KVC5BMk7ccH8B
GCM62OODIUXHYPTVUZT2W4GKPIO7YMLZDNPR4NGUWLBU7KPOU7Q7E44X
48Zvk6W9kfXik8CEscQYjEZdDCVZtXNEGdjczTR4XD9SKfLWkirntGLR7UyhD7aas3C2N3QefcdB4gyLZt93CrmtP5WAeqJ
qz448vxrv9y6lsy0l4y6x98gylykleumxqnqs7fkn6
1AvqxpSfuNooDv2gn8rFNXiWP64bn7m8xa
0x7374d06666974119Fb6C8c1F10D4Ab7eCB724Fcd
LKcXMo6X6jGyk9o9phn4YvYUQ8QVR4wJgo
ronin:bb375c985bc63d448b3bc14cda06b2866f75e342
+79889916188
+79889916188
+79889916188
MJfnNkoXewo8QB5iu9dee2exwdavDxWRLC
ltc1q309prv3k8lc9gqd062eevjvxmkgyv00xe3m6jg
3Gs18Dq8SNrs3kLQdrpUFHa2yX8uD9ZXR7
bc1qhcynpwvj6lvdh393ph8tesk0mljsc6z3y40h2m
89PjhdrngYjeSa8dFeg6q8Sz4BXdrLLP8H8z82eUhTNjPBpTYkr3o6fWnkqng9D5TRaPT4HafXwUTJqcPE8SsbHUK5PM2Qx
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MoUSO.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MoUSO.exe -
Executes dropped EXE 3 IoCs
pid Process 884 MoUSO.exe 1280 MoUSO.exe 1880 MoUSO.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MoUSO.exe -
resource yara_rule behavioral1/memory/1924-56-0x0000000000EB0000-0x00000000015D0000-memory.dmp themida behavioral1/memory/1924-57-0x0000000000EB0000-0x00000000015D0000-memory.dmp themida behavioral1/memory/1924-78-0x0000000000EB0000-0x00000000015D0000-memory.dmp themida behavioral1/memory/2016-84-0x0000000000EB0000-0x00000000015D0000-memory.dmp themida behavioral1/files/0x00080000000122d5-85.dat themida behavioral1/files/0x00080000000122d5-87.dat themida behavioral1/memory/884-90-0x0000000000830000-0x0000000000F50000-memory.dmp themida behavioral1/memory/884-91-0x0000000000830000-0x0000000000F50000-memory.dmp themida behavioral1/files/0x00080000000122d5-105.dat themida behavioral1/memory/884-109-0x0000000000830000-0x0000000000F50000-memory.dmp themida behavioral1/files/0x00080000000122d5-113.dat themida behavioral1/memory/1880-116-0x0000000000830000-0x0000000000F50000-memory.dmp themida behavioral1/memory/1880-117-0x0000000000830000-0x0000000000F50000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUSO.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUSO.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1924 set thread context of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 884 set thread context of 1280 884 MoUSO.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 884 MoUSO.exe 884 MoUSO.exe 884 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe 1280 MoUSO.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe Token: SeDebugPrivilege 884 MoUSO.exe Token: SeDebugPrivilege 1880 MoUSO.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 1924 wrote to memory of 2016 1924 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 28 PID 2016 wrote to memory of 1276 2016 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 30 PID 2016 wrote to memory of 1276 2016 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 30 PID 2016 wrote to memory of 1276 2016 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 30 PID 2016 wrote to memory of 1276 2016 37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe 30 PID 808 wrote to memory of 884 808 taskeng.exe 33 PID 808 wrote to memory of 884 808 taskeng.exe 33 PID 808 wrote to memory of 884 808 taskeng.exe 33 PID 808 wrote to memory of 884 808 taskeng.exe 33 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 884 wrote to memory of 1280 884 MoUSO.exe 34 PID 808 wrote to memory of 1880 808 taskeng.exe 35 PID 808 wrote to memory of 1880 808 taskeng.exe 35 PID 808 wrote to memory of 1880 808 taskeng.exe 35 PID 808 wrote to memory of 1880 808 taskeng.exe 35 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36 PID 1880 wrote to memory of 1676 1880 MoUSO.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe"C:\Users\Admin\AppData\Local\Temp\37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe"C:\Users\Admin\AppData\Local\Temp\37611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"3⤵
- Creates scheduled task(s)
PID:1276
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {48D4981D-F4CD-45C7-9921-B4AAB2F933FF} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\cache\MoUSO.exe"C:\Users\Admin\AppData\Local\cache\MoUSO.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\cache\MoUSO.exe"C:\Users\Admin\AppData\Local\cache\MoUSO.exe"3⤵PID:1676
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.1MB
MD5aa9aeef0c7f798b7a2304a36f019a4d5
SHA153e215bae2435c8d513dc05e4b759b432b732b37
SHA25637611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402
SHA51201cb47ed8569519ee56b30c81baceef5ffb6c5278caff6cf0eb8024dd7dd06a609274a827fdd79d028462f22793ef6f3d79f0b3eed1aa4053a190edbb7e4e014
-
Filesize
7.1MB
MD5aa9aeef0c7f798b7a2304a36f019a4d5
SHA153e215bae2435c8d513dc05e4b759b432b732b37
SHA25637611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402
SHA51201cb47ed8569519ee56b30c81baceef5ffb6c5278caff6cf0eb8024dd7dd06a609274a827fdd79d028462f22793ef6f3d79f0b3eed1aa4053a190edbb7e4e014
-
Filesize
7.1MB
MD5aa9aeef0c7f798b7a2304a36f019a4d5
SHA153e215bae2435c8d513dc05e4b759b432b732b37
SHA25637611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402
SHA51201cb47ed8569519ee56b30c81baceef5ffb6c5278caff6cf0eb8024dd7dd06a609274a827fdd79d028462f22793ef6f3d79f0b3eed1aa4053a190edbb7e4e014
-
Filesize
7.1MB
MD5aa9aeef0c7f798b7a2304a36f019a4d5
SHA153e215bae2435c8d513dc05e4b759b432b732b37
SHA25637611974a3ee8ab0a2a0849f4421ed44e3b51ee3fb7a24e12111340c9ec15402
SHA51201cb47ed8569519ee56b30c81baceef5ffb6c5278caff6cf0eb8024dd7dd06a609274a827fdd79d028462f22793ef6f3d79f0b3eed1aa4053a190edbb7e4e014