Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe
Resource
win10v2004-20220901-en
General
-
Target
030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe
-
Size
180KB
-
MD5
6df0a3bfe08275448a9c47b2db80b420
-
SHA1
4df8b0cb02e16614e3d86467dba9ea54efb710ea
-
SHA256
030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78
-
SHA512
9e5f78474844d48f5aa15f6a8754564f03aff58674dcd7923a5cdd60f51c1153808ceb1926be4b88ba09f581ede660179fbe9217feb19bb83e571535cd736c74
-
SSDEEP
3072:LIkGdYRLoeEdRos/eaqFnqWDb+uTyLDC6s5sSYqGlC6YViZj5HQXZmmJ0yCFioxd:kVcKPpm2lC6YViZj5HQXZmmJ0yCF9Bxj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bzrauv.exe -
Executes dropped EXE 1 IoCs
pid Process 844 bzrauv.exe -
Loads dropped DLL 2 IoCs
pid Process 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /i" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /E" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /R" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /p" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /a" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /S" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /h" bzrauv.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /t" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /W" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /N" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /P" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /d" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /v" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /z" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /u" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /M" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /H" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /Q" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /I" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /y" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /L" 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /G" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /j" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /s" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /O" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /D" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /b" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /U" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /F" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /A" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /Z" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /c" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /w" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /T" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /l" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /r" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /L" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /J" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /K" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /g" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /f" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /k" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /o" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /e" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /C" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /m" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /q" bzrauv.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /V" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /n" bzrauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\bzrauv = "C:\\Users\\Admin\\bzrauv.exe /Y" bzrauv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe 844 bzrauv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 844 bzrauv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 844 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 26 PID 1348 wrote to memory of 844 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 26 PID 1348 wrote to memory of 844 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 26 PID 1348 wrote to memory of 844 1348 030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe"C:\Users\Admin\AppData\Local\Temp\030c0d76bfa1a92328c57997b9cf062a7aabd7cf2ae0add44e59015dd24a4a78.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\bzrauv.exe"C:\Users\Admin\bzrauv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5da96048c0cada8b0743a1bc4ac01a0bc
SHA1bbc9bfd5be2a2ce792a9df779d22572b83fb16cb
SHA256bbc66c337d3dffbea789f2134447dfd0b9f1fe2d9d47ae33ee5932d5fa1c40e4
SHA512e7a9b0d37bfb5e43e5cee7561c5ed2c0eeabe9dbb19560d678de50f20e2dce976d07da2b2915d7c91686b545ded8c4c4aa0b8f07990ad841016b8b4789db2be8
-
Filesize
180KB
MD5da96048c0cada8b0743a1bc4ac01a0bc
SHA1bbc9bfd5be2a2ce792a9df779d22572b83fb16cb
SHA256bbc66c337d3dffbea789f2134447dfd0b9f1fe2d9d47ae33ee5932d5fa1c40e4
SHA512e7a9b0d37bfb5e43e5cee7561c5ed2c0eeabe9dbb19560d678de50f20e2dce976d07da2b2915d7c91686b545ded8c4c4aa0b8f07990ad841016b8b4789db2be8
-
Filesize
180KB
MD5da96048c0cada8b0743a1bc4ac01a0bc
SHA1bbc9bfd5be2a2ce792a9df779d22572b83fb16cb
SHA256bbc66c337d3dffbea789f2134447dfd0b9f1fe2d9d47ae33ee5932d5fa1c40e4
SHA512e7a9b0d37bfb5e43e5cee7561c5ed2c0eeabe9dbb19560d678de50f20e2dce976d07da2b2915d7c91686b545ded8c4c4aa0b8f07990ad841016b8b4789db2be8
-
Filesize
180KB
MD5da96048c0cada8b0743a1bc4ac01a0bc
SHA1bbc9bfd5be2a2ce792a9df779d22572b83fb16cb
SHA256bbc66c337d3dffbea789f2134447dfd0b9f1fe2d9d47ae33ee5932d5fa1c40e4
SHA512e7a9b0d37bfb5e43e5cee7561c5ed2c0eeabe9dbb19560d678de50f20e2dce976d07da2b2915d7c91686b545ded8c4c4aa0b8f07990ad841016b8b4789db2be8