Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe
Resource
win10v2004-20220901-en
General
-
Target
ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe
-
Size
184KB
-
MD5
2330318a2a8e39b4212cb41ea373d983
-
SHA1
6e9c9e7b13f12b993d394d2b39619b73752f6375
-
SHA256
ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573
-
SHA512
4236ac621fc04ea40825b34a23b8da47a9e5cdcb7a8660322f41f341cbe304bc5ff3a806f0275cb3163add30d4be59a5d5389b97868b9824dc99be96b6c178e8
-
SSDEEP
3072:7e1cfl/BTyzcM+Knvmb7/D263i4qMbBQhAKIWOD2r1oX1/hcNcfAUane4RzsUZSb:wClpTFzKnvmb7/D26y4qMSyKbOD2r1oj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" burir.exe -
Executes dropped EXE 1 IoCs
pid Process 112 burir.exe -
Loads dropped DLL 2 IoCs
pid Process 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /g" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /d" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /h" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /D" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /y" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /P" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /A" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /f" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /S" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /k" ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /T" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /X" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /j" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /b" burir.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /L" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /t" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /n" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /z" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /i" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /k" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /K" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /o" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /N" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /I" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /l" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /c" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /G" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /u" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /v" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /E" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /w" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /M" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /Z" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /s" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /F" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /W" burir.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /O" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /V" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /x" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /U" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /R" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /q" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /C" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /r" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /B" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /m" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /J" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /e" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /a" burir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\burir = "C:\\Users\\Admin\\burir.exe /Q" burir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe 112 burir.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 112 burir.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 852 wrote to memory of 112 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 27 PID 852 wrote to memory of 112 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 27 PID 852 wrote to memory of 112 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 27 PID 852 wrote to memory of 112 852 ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe"C:\Users\Admin\AppData\Local\Temp\ac64e14259cb8d9e5c7ab9457f1ea4d4e4a15de56e101b7e1bf817c160801573.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\burir.exe"C:\Users\Admin\burir.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5e5d402d45740bdd5b31d63fbb2acdedb
SHA105c4fa5eb6b7685c6744e36a5fdf47b87f6b9ced
SHA2564bda2be7633d1c9d36f2265d4f6a5baf31afe1b89be87f645842b96b30b6f8a7
SHA5129b22286f4206679b71fff6bcd029943e2caedb722f1a55076d00c80953976b1a2e73599fab7c7df7e38c5c82ad5206104ee5c7ec7fe2eb35cd537c4370381e27
-
Filesize
184KB
MD5e5d402d45740bdd5b31d63fbb2acdedb
SHA105c4fa5eb6b7685c6744e36a5fdf47b87f6b9ced
SHA2564bda2be7633d1c9d36f2265d4f6a5baf31afe1b89be87f645842b96b30b6f8a7
SHA5129b22286f4206679b71fff6bcd029943e2caedb722f1a55076d00c80953976b1a2e73599fab7c7df7e38c5c82ad5206104ee5c7ec7fe2eb35cd537c4370381e27
-
Filesize
184KB
MD5e5d402d45740bdd5b31d63fbb2acdedb
SHA105c4fa5eb6b7685c6744e36a5fdf47b87f6b9ced
SHA2564bda2be7633d1c9d36f2265d4f6a5baf31afe1b89be87f645842b96b30b6f8a7
SHA5129b22286f4206679b71fff6bcd029943e2caedb722f1a55076d00c80953976b1a2e73599fab7c7df7e38c5c82ad5206104ee5c7ec7fe2eb35cd537c4370381e27
-
Filesize
184KB
MD5e5d402d45740bdd5b31d63fbb2acdedb
SHA105c4fa5eb6b7685c6744e36a5fdf47b87f6b9ced
SHA2564bda2be7633d1c9d36f2265d4f6a5baf31afe1b89be87f645842b96b30b6f8a7
SHA5129b22286f4206679b71fff6bcd029943e2caedb722f1a55076d00c80953976b1a2e73599fab7c7df7e38c5c82ad5206104ee5c7ec7fe2eb35cd537c4370381e27