Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:13
Static task
static1
Behavioral task
behavioral1
Sample
fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe
Resource
win10v2004-20220901-en
General
-
Target
fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe
-
Size
204KB
-
MD5
a06586a1e78d9e9880439d2d307a0050
-
SHA1
504d005537be1e1301f94e2727fd5354a86b3286
-
SHA256
fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e
-
SHA512
81b8c1a31e727b88d678187fdc8593fa970ca84e4484b571166c5595d02370ed19f81d32e44743ffecf058c59355769a26326c299cf0d3e0fc1423ef849bd3c1
-
SSDEEP
3072:CMnZLNVnha1paHDLo8xxwhlT2sqcDNvYgWsGKc64gJ3o/pDjOTVwI2n43st:FzVE14LpMlTxDhWUR5GZjOTQKs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muiopiy.exe -
Executes dropped EXE 1 IoCs
pid Process 984 muiopiy.exe -
Loads dropped DLL 2 IoCs
pid Process 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /S" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /t" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /r" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /Q" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /w" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /n" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /m" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /b" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /A" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /Y" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /d" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /L" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /s" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /p" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /J" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /V" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /f" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /U" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /i" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /y" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /X" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /u" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /T" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /v" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /Z" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /W" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /h" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /I" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /N" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /B" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /P" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /o" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /g" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /O" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /e" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /q" muiopiy.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /R" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /D" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /K" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /a" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /j" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /l" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /G" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /H" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /C" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /M" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /c" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /F" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /E" muiopiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiopiy = "C:\\Users\\Admin\\muiopiy.exe /z" muiopiy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe 984 muiopiy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe 984 muiopiy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 984 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe 27 PID 1292 wrote to memory of 984 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe 27 PID 1292 wrote to memory of 984 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe 27 PID 1292 wrote to memory of 984 1292 fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe"C:\Users\Admin\AppData\Local\Temp\fed4d56e5a8a9f06c2fd6fdf0d649d462a18540ed63cd4fbff8b74a382782a3e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\muiopiy.exe"C:\Users\Admin\muiopiy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5a95c8a223d9031d2cf206a14fee4e46b
SHA13fb4ae412ed3f68948871dcb95289d9b86ee42a9
SHA25600ef19f14152983e11439fb8ea757082e4dc1a7c46ca565b85d62eacdfe40e47
SHA5129b6679777c2e45bd67bb90d24177ea651cc2227fcdfd1fdb2a891708eddc4763e3efd207ec6f06128270f1c22a38a060cecffc5d85075caf6052b8674bccbe94
-
Filesize
204KB
MD5a95c8a223d9031d2cf206a14fee4e46b
SHA13fb4ae412ed3f68948871dcb95289d9b86ee42a9
SHA25600ef19f14152983e11439fb8ea757082e4dc1a7c46ca565b85d62eacdfe40e47
SHA5129b6679777c2e45bd67bb90d24177ea651cc2227fcdfd1fdb2a891708eddc4763e3efd207ec6f06128270f1c22a38a060cecffc5d85075caf6052b8674bccbe94
-
Filesize
204KB
MD5a95c8a223d9031d2cf206a14fee4e46b
SHA13fb4ae412ed3f68948871dcb95289d9b86ee42a9
SHA25600ef19f14152983e11439fb8ea757082e4dc1a7c46ca565b85d62eacdfe40e47
SHA5129b6679777c2e45bd67bb90d24177ea651cc2227fcdfd1fdb2a891708eddc4763e3efd207ec6f06128270f1c22a38a060cecffc5d85075caf6052b8674bccbe94
-
Filesize
204KB
MD5a95c8a223d9031d2cf206a14fee4e46b
SHA13fb4ae412ed3f68948871dcb95289d9b86ee42a9
SHA25600ef19f14152983e11439fb8ea757082e4dc1a7c46ca565b85d62eacdfe40e47
SHA5129b6679777c2e45bd67bb90d24177ea651cc2227fcdfd1fdb2a891708eddc4763e3efd207ec6f06128270f1c22a38a060cecffc5d85075caf6052b8674bccbe94