Analysis
-
max time kernel
151s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 20:29
Static task
static1
Behavioral task
behavioral1
Sample
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe
Resource
win10v2004-20220812-en
General
-
Target
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe
-
Size
156KB
-
MD5
6c0a33f53233906586cd6ba124aa1dc8
-
SHA1
9165be1ca5a0f91d8d21b173ac4be7188418e3f9
-
SHA256
569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293
-
SHA512
42d6704a63d5b98ece548da88d1ecccd15b7fff4469753328f5b31bac2b898a23153d0b95a639f9af7abbbd592f9bb41eb77ba52154cdd3988d215ae7c3c66e2
-
SSDEEP
1536:MZan4ngzp0B8GMNuRe305Xrud5N9jRMmBUKH7zD87/u+JcBqVbv1BsbhbEle+RRw:fogekufubFKVXcBqB1BGSjNX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tutil.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 tutil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /d" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /n" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /i" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /w" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /j" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /p" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /b" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /c" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /l" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /u" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /v" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /o" tutil.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /a" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /q" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /f" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /y" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /r" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /g" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /e" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /k" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /h" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /m" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /g" 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /z" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /t" tutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tutil = "C:\\Users\\Admin\\tutil.exe /s" tutil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4072 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 4072 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe 3604 tutil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4072 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 3604 tutil.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3604 4072 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 82 PID 4072 wrote to memory of 3604 4072 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 82 PID 4072 wrote to memory of 3604 4072 569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe"C:\Users\Admin\AppData\Local\Temp\569b20b5c29521ef8ae02ce31de4216b1d30c194d101e63f6987f47f3832e293.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\tutil.exe"C:\Users\Admin\tutil.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD510d9f71c5b79a1fdaa60132f6136e5d5
SHA1b9cf301dbf3023f878cd3896a0ccd5aecb47e31b
SHA256f0e96bbb12da2bdcc0e585012761a4f2b552abdac806d002959ec79f05167197
SHA5120d5fb44ce5c943bfb5970af8184b0e12b2a22cb7d92d4da212e1ca1788f0be57578b8ebe50c30ad546122eb4b0dd8e6c782d87541e150edde8487cf61b1f4f6c
-
Filesize
156KB
MD510d9f71c5b79a1fdaa60132f6136e5d5
SHA1b9cf301dbf3023f878cd3896a0ccd5aecb47e31b
SHA256f0e96bbb12da2bdcc0e585012761a4f2b552abdac806d002959ec79f05167197
SHA5120d5fb44ce5c943bfb5970af8184b0e12b2a22cb7d92d4da212e1ca1788f0be57578b8ebe50c30ad546122eb4b0dd8e6c782d87541e150edde8487cf61b1f4f6c