Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 09:33
Static task
static1
Behavioral task
behavioral1
Sample
6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe
Resource
win10v2004-20220812-en
General
-
Target
6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe
-
Size
76KB
-
MD5
1ff0ac95c661c5df7f326045970c69f0
-
SHA1
0a82bfdb9a9f80cc62c7f1fbcb38f9d3dacb83cc
-
SHA256
6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98
-
SHA512
81f04f6452ab95d59a0fac70e456d43efffd00ca07fcd5babe2192afdc9690ae6cb7b8668f7a2e58a716788cdccd6db6df76108a285b9be5881b484cd34ab2c6
-
SSDEEP
1536:19LuGChUG5r3QH+rmYV8j2PWPXLq0zTrksZ:fyLhdQH+rmYV8/XTzTosZ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saouvo.exe -
Executes dropped EXE 1 IoCs
pid Process 876 saouvo.exe -
Loads dropped DLL 2 IoCs
pid Process 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /g" saouvo.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /z" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /e" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /r" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /n" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /u" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /p" saouvo.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /o" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /q" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /l" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /m" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /i" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /h" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /a" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /w" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /c" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /b" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /s" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /i" 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /f" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /y" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /k" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /x" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /j" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /t" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /v" saouvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saouvo = "C:\\Users\\Admin\\saouvo.exe /d" saouvo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe 876 saouvo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 876 saouvo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 284 wrote to memory of 876 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 27 PID 284 wrote to memory of 876 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 27 PID 284 wrote to memory of 876 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 27 PID 284 wrote to memory of 876 284 6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe"C:\Users\Admin\AppData\Local\Temp\6dfbb454a4917ca44c7941c737a83ac127e35c8c3da625b66ab8054c1fbe7d98.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Users\Admin\saouvo.exe"C:\Users\Admin\saouvo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD55b90118ea5288940d4af8f66ad82a2b1
SHA1d378424ed62133a0eabc305614b32e4701084349
SHA2563d6c832c486794d7c4d33b33568375010024f80e53f65dcf52d8020772f27afc
SHA512cf13051e4002c72adefc47b0cb905087015d234e09636121460e550e14fd57d20faf7162237b50fa88ab10d6d2caaa0f960e8888badca172e82346632e55bd3f
-
Filesize
76KB
MD55b90118ea5288940d4af8f66ad82a2b1
SHA1d378424ed62133a0eabc305614b32e4701084349
SHA2563d6c832c486794d7c4d33b33568375010024f80e53f65dcf52d8020772f27afc
SHA512cf13051e4002c72adefc47b0cb905087015d234e09636121460e550e14fd57d20faf7162237b50fa88ab10d6d2caaa0f960e8888badca172e82346632e55bd3f
-
Filesize
76KB
MD55b90118ea5288940d4af8f66ad82a2b1
SHA1d378424ed62133a0eabc305614b32e4701084349
SHA2563d6c832c486794d7c4d33b33568375010024f80e53f65dcf52d8020772f27afc
SHA512cf13051e4002c72adefc47b0cb905087015d234e09636121460e550e14fd57d20faf7162237b50fa88ab10d6d2caaa0f960e8888badca172e82346632e55bd3f
-
Filesize
76KB
MD55b90118ea5288940d4af8f66ad82a2b1
SHA1d378424ed62133a0eabc305614b32e4701084349
SHA2563d6c832c486794d7c4d33b33568375010024f80e53f65dcf52d8020772f27afc
SHA512cf13051e4002c72adefc47b0cb905087015d234e09636121460e550e14fd57d20faf7162237b50fa88ab10d6d2caaa0f960e8888badca172e82346632e55bd3f