Analysis
-
max time kernel
152s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:09
Static task
static1
Behavioral task
behavioral1
Sample
5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe
Resource
win10v2004-20220812-en
General
-
Target
5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe
-
Size
240KB
-
MD5
960f10fc899ced2e58048ec820eb3643
-
SHA1
6abdbd6585f704071eb2ff3433ca8a38f629e42c
-
SHA256
5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca
-
SHA512
de4291235f3367eeaf91fdfbb51dcc66006a860fbf998b9c0d40f82fcec33f7bc662c57d5c8e0e16afe4457a60f1b136c85566e83a4a7af61d241ef1df3a3ac8
-
SSDEEP
6144:8Ua3dwqsNwemAB0EqxF6snji81RUinKchhy+S3k:AdQQJsZU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geuhoam.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 geuhoam.exe -
Loads dropped DLL 2 IoCs
pid Process 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /p" 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /o" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /e" geuhoam.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /v" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /a" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /x" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /s" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /m" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /k" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /w" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /n" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /p" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /t" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /h" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /g" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /i" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /l" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /d" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /b" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /q" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /y" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /c" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /z" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /j" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /r" geuhoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\geuhoam = "C:\\Users\\Admin\\geuhoam.exe /u" geuhoam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe 2000 geuhoam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 2000 geuhoam.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2000 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 28 PID 1604 wrote to memory of 2000 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 28 PID 1604 wrote to memory of 2000 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 28 PID 1604 wrote to memory of 2000 1604 5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe"C:\Users\Admin\AppData\Local\Temp\5db4d70abe5d0a9db9d33cc326f454ba9042a170a97d67eff7d65d6216ea30ca.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\geuhoam.exe"C:\Users\Admin\geuhoam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5df12b875e6d595bebb0db6ca48028479
SHA1b67dcb65c3f83e5e4e8bf08a363c91b18014cf81
SHA256acf1d6bbbe7f394a1e5504a09e415c6d1b236c7556615e30e3a1d6ee38bbc013
SHA512195ff3ba9e0d6fd3e2a0dd0f233474f2509b1b8b19901c648cfa919626a865d50094db74a735edb9941cd69289eb16f1fa3033f4d95b7dcee0af8d0e7335bed8
-
Filesize
240KB
MD5df12b875e6d595bebb0db6ca48028479
SHA1b67dcb65c3f83e5e4e8bf08a363c91b18014cf81
SHA256acf1d6bbbe7f394a1e5504a09e415c6d1b236c7556615e30e3a1d6ee38bbc013
SHA512195ff3ba9e0d6fd3e2a0dd0f233474f2509b1b8b19901c648cfa919626a865d50094db74a735edb9941cd69289eb16f1fa3033f4d95b7dcee0af8d0e7335bed8
-
Filesize
240KB
MD5df12b875e6d595bebb0db6ca48028479
SHA1b67dcb65c3f83e5e4e8bf08a363c91b18014cf81
SHA256acf1d6bbbe7f394a1e5504a09e415c6d1b236c7556615e30e3a1d6ee38bbc013
SHA512195ff3ba9e0d6fd3e2a0dd0f233474f2509b1b8b19901c648cfa919626a865d50094db74a735edb9941cd69289eb16f1fa3033f4d95b7dcee0af8d0e7335bed8
-
Filesize
240KB
MD5df12b875e6d595bebb0db6ca48028479
SHA1b67dcb65c3f83e5e4e8bf08a363c91b18014cf81
SHA256acf1d6bbbe7f394a1e5504a09e415c6d1b236c7556615e30e3a1d6ee38bbc013
SHA512195ff3ba9e0d6fd3e2a0dd0f233474f2509b1b8b19901c648cfa919626a865d50094db74a735edb9941cd69289eb16f1fa3033f4d95b7dcee0af8d0e7335bed8