Analysis
-
max time kernel
303s -
max time network
254s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12-10-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe
Resource
win7-20220812-en
General
-
Target
95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe
-
Size
850KB
-
MD5
f183d934a954fc80602a9173f55f22c9
-
SHA1
a472c526f1dec0eb9bccdf2e083171a176faf1c4
-
SHA256
95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
-
SHA512
48d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24
-
SSDEEP
12288:jYmzPxoepv5EUOPri4BTVUDnV89SxP3ol8VU9o:/xoS6TjUDnlP3G9o
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=finarnw
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4204 MoUSO.exe 208 MoUSO.exe 252 MoUSO.exe 2044 MoUSO.exe 4076 MoUSO.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2344 set thread context of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 4204 set thread context of 252 4204 MoUSO.exe 73 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 4204 MoUSO.exe 4204 MoUSO.exe 4204 MoUSO.exe 4204 MoUSO.exe 4204 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe 252 MoUSO.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe Token: SeDebugPrivilege 4204 MoUSO.exe Token: SeDebugPrivilege 2044 MoUSO.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4572 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 67 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 2344 wrote to memory of 4616 2344 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 68 PID 4616 wrote to memory of 3736 4616 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 69 PID 4616 wrote to memory of 3736 4616 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 69 PID 4616 wrote to memory of 3736 4616 95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe 69 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 208 4204 MoUSO.exe 72 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 4204 wrote to memory of 252 4204 MoUSO.exe 73 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 4076 2044 MoUSO.exe 75 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76 PID 2044 wrote to memory of 3816 2044 MoUSO.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe"C:\Users\Admin\AppData\Local\Temp\95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe"C:\Users\Admin\AppData\Local\Temp\95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe"2⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe"C:\Users\Admin\AppData\Local\Temp\95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"3⤵
- Creates scheduled task(s)
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\cache\MoUSO.exe"C:\Users\Admin\AppData\Local\cache\MoUSO.exe"2⤵
- Executes dropped EXE
PID:208
-
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exe"C:\Users\Admin\AppData\Local\cache\MoUSO.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:252
-
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\cache\MoUSO.exe"C:\Users\Admin\AppData\Local\cache\MoUSO.exe"2⤵
- Executes dropped EXE
PID:4076
-
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exe"C:\Users\Admin\AppData\Local\cache\MoUSO.exe"2⤵PID:3816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d567f19f34a4bb9387d89a16e0c18b6a
SHA1cfd95ea4d78455ea99aca178e3220a80af8a5abf
SHA2563ea54c0511a9b9ebd3c5242ac121fa76643e5492043987c8dc633cb47ee33f72
SHA512861e78011452f94120d9ee2f6c46845f1ff56c6b7a863a0ec17123c463364824677e0374ca259a456e2971542ba533943d0bc50979fcbe5160a52c404f3f5c27
-
Filesize
850KB
MD5f183d934a954fc80602a9173f55f22c9
SHA1a472c526f1dec0eb9bccdf2e083171a176faf1c4
SHA25695de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
SHA51248d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24
-
Filesize
850KB
MD5f183d934a954fc80602a9173f55f22c9
SHA1a472c526f1dec0eb9bccdf2e083171a176faf1c4
SHA25695de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
SHA51248d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24
-
Filesize
850KB
MD5f183d934a954fc80602a9173f55f22c9
SHA1a472c526f1dec0eb9bccdf2e083171a176faf1c4
SHA25695de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
SHA51248d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24
-
Filesize
850KB
MD5f183d934a954fc80602a9173f55f22c9
SHA1a472c526f1dec0eb9bccdf2e083171a176faf1c4
SHA25695de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
SHA51248d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24
-
Filesize
850KB
MD5f183d934a954fc80602a9173f55f22c9
SHA1a472c526f1dec0eb9bccdf2e083171a176faf1c4
SHA25695de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
SHA51248d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24
-
Filesize
850KB
MD5f183d934a954fc80602a9173f55f22c9
SHA1a472c526f1dec0eb9bccdf2e083171a176faf1c4
SHA25695de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57
SHA51248d42d3c6ca44944ea6879bb5c6367e5c03b938648f9667f235815acb02aa8191e02ca840acc855bf83b9ed0945a5516bb6c4433e7859efafb58b4b18b92ef24