Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe
Resource
win10v2004-20220812-en
General
-
Target
d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe
-
Size
646KB
-
MD5
6f01d3b1f9ecbc44872cc4c3b7fbbb50
-
SHA1
7c037c90249c220909c2fff9f583d9a4912b1d2a
-
SHA256
d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee
-
SHA512
845662c0bdc2b4afedbba1fad71ad6f6eb3cd783269ff451cae2156f06fa7303c0bcb0040172ec1c1be93852238551c2b39ab4e98d7be31e09d6d23ecf200b25
-
SSDEEP
12288:OHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:ODgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 5008 tuzeupv.exe 4016 ~DFA228.tmp 928 muhucuk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ~DFA228.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe 928 muhucuk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4016 ~DFA228.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2244 wrote to memory of 5008 2244 d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe 82 PID 2244 wrote to memory of 5008 2244 d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe 82 PID 2244 wrote to memory of 5008 2244 d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe 82 PID 5008 wrote to memory of 4016 5008 tuzeupv.exe 83 PID 5008 wrote to memory of 4016 5008 tuzeupv.exe 83 PID 5008 wrote to memory of 4016 5008 tuzeupv.exe 83 PID 2244 wrote to memory of 548 2244 d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe 85 PID 2244 wrote to memory of 548 2244 d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe 85 PID 2244 wrote to memory of 548 2244 d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe 85 PID 4016 wrote to memory of 928 4016 ~DFA228.tmp 87 PID 4016 wrote to memory of 928 4016 ~DFA228.tmp 87 PID 4016 wrote to memory of 928 4016 ~DFA228.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe"C:\Users\Admin\AppData\Local\Temp\d82f8e99f724f2b215ac98c0bd03b4d870f78393957e57cc3844bc170ddd46ee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\tuzeupv.exeC:\Users\Admin\AppData\Local\Temp\tuzeupv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\~DFA228.tmpC:\Users\Admin\AppData\Local\Temp\~DFA228.tmp OK3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\muhucuk.exe"C:\Users\Admin\AppData\Local\Temp\muhucuk.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵PID:548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD5e75e581cee72b16aebdf48cfec6419fe
SHA1d3db67bc98097e40f30b3cf2e078efcb82173cab
SHA256ee612b1dc5478acc76e35961c4bd820f1e8173180a89102ccb60f58cfeedb98b
SHA512671704f4eb925c917a31f897680c0522eedc27fd8d9014aa78c152d3ad3e38db979fc6c42fe8a74563a32accf22bad4f2df5430feae3034b3760087442249d64
-
Filesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
Filesize
480B
MD5329c5a54c252e8d6a6c388b5ff74f5f0
SHA1ce1f7a485ceb4a8e3ddc05828bcbd1bd28ad5c8e
SHA2563ba76f9ce767356b3f3d23051b495b380ef2572b7ab6499738bf346cd219ebdd
SHA5128bfa11031e402377d09fc8fdcafb1e5191d42a2436406145d06a7a2a39745c97f49fdf2dad7e70094ba5bec8acacf91d45791890ef59d954fb7047b2d8ea9b25
-
Filesize
409KB
MD5ed0ae5e821d2c9798b48c71611df1ec3
SHA1649fee6001e82cab12c4d19bcb4f6265daaa3227
SHA2561fcd3cf109aee9f30045019a57a99d77be78bc3b1241b8c58a83318d1cbde2e6
SHA5123a5f49732b1ce0b29e7febff91fe9098183f4a6b6c4bc9316cd9370a0204e376a28d25ff87bb303a66e1934902e09a22e803f493c2e9a4913f19fce158acc83b
-
Filesize
409KB
MD5ed0ae5e821d2c9798b48c71611df1ec3
SHA1649fee6001e82cab12c4d19bcb4f6265daaa3227
SHA2561fcd3cf109aee9f30045019a57a99d77be78bc3b1241b8c58a83318d1cbde2e6
SHA5123a5f49732b1ce0b29e7febff91fe9098183f4a6b6c4bc9316cd9370a0204e376a28d25ff87bb303a66e1934902e09a22e803f493c2e9a4913f19fce158acc83b
-
Filesize
655KB
MD5bdd9ff0c8eee2261585822ddbfac0a35
SHA13e2cefda568faf5117f7dcc7eca1a44d83d7ffd4
SHA25687cfb05dd568eaa2ffd99d8f1127d024e9eb75988f016276e1fd239ccd4e3411
SHA512cb5f101ed1bb61fa014b72e17aa916c06cbac7e2b444eaf3fe49d82abc07a0904f78fd1d946ad4b6ddd5913364cee66753d795f128f85924b6fc52aa6baa1bf2
-
Filesize
655KB
MD5bdd9ff0c8eee2261585822ddbfac0a35
SHA13e2cefda568faf5117f7dcc7eca1a44d83d7ffd4
SHA25687cfb05dd568eaa2ffd99d8f1127d024e9eb75988f016276e1fd239ccd4e3411
SHA512cb5f101ed1bb61fa014b72e17aa916c06cbac7e2b444eaf3fe49d82abc07a0904f78fd1d946ad4b6ddd5913364cee66753d795f128f85924b6fc52aa6baa1bf2
-
Filesize
658KB
MD5d59fd636031dbe14eba32e306dc3cd4b
SHA1702fb78c11056021963c8e8af7a387e90bba9756
SHA25699fb48bd484534fe56e01130f674df6be3e89b6b7c62dc38222b9446671ec3a4
SHA512b06176dd8e261432f5c40b6f1af481d6475193726cbda703dd1dd4896fea8e3fd31ded4dbdcc8c1ec0d4fe599c00d99000c211e41cc1930b4111f7bc6cc19dc6
-
Filesize
658KB
MD5d59fd636031dbe14eba32e306dc3cd4b
SHA1702fb78c11056021963c8e8af7a387e90bba9756
SHA25699fb48bd484534fe56e01130f674df6be3e89b6b7c62dc38222b9446671ec3a4
SHA512b06176dd8e261432f5c40b6f1af481d6475193726cbda703dd1dd4896fea8e3fd31ded4dbdcc8c1ec0d4fe599c00d99000c211e41cc1930b4111f7bc6cc19dc6