Analysis
-
max time kernel
152s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe
Resource
win10v2004-20220812-en
General
-
Target
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe
-
Size
224KB
-
MD5
96f45c6ffe73af344dae68a42a2719cf
-
SHA1
9890323dfd5a0f0418c6bcf5da6f8d0f732d92ef
-
SHA256
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f
-
SHA512
d2e2785b36b29ff5e869bde7d515c7d126b766e0e8aea50bc5692cf876624a56902750577d5496d793df8dac361e0f258501a19fda89397c319a7ba27bbc3cd7
-
SSDEEP
3072:o0b3N87hBQlAZV7l2mclfj4Uvx+9sNxu+2eRcKgsU61JkkX39RLrw4ySKUbax2+n:BNXG74L76nrZ3X
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bouegoy.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 bouegoy.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /i" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /t" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /x" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /j" bouegoy.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /m" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /p" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /h" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /e" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /n" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /d" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /a" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /c" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /r" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /q" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /u" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /l" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /s" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /z" bouegoy.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /j" d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /y" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /b" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /o" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /v" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /w" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /g" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /f" bouegoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\bouegoy = "C:\\Users\\Admin\\bouegoy.exe /k" bouegoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe 1364 bouegoy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 1364 bouegoy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1364 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 27 PID 1976 wrote to memory of 1364 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 27 PID 1976 wrote to memory of 1364 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 27 PID 1976 wrote to memory of 1364 1976 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe"C:\Users\Admin\AppData\Local\Temp\d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\bouegoy.exe"C:\Users\Admin\bouegoy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5afa953cc0e7f83f32375c90213a738bd
SHA1d2999a436c5afdec364b6fb812018ced2c73d6ad
SHA25699612450943221b35a6d4a54a6aef874c69e61efd2d1a945db622e324db8b1d9
SHA512452b0ec06f53e4db3906a5c9299818d1591c69414a34c174ff27a371ecb0b36f12839ed484c84538d5bef0617fc75a3f7ff8ed6fbc334b3e3230b6b55981665e
-
Filesize
224KB
MD5afa953cc0e7f83f32375c90213a738bd
SHA1d2999a436c5afdec364b6fb812018ced2c73d6ad
SHA25699612450943221b35a6d4a54a6aef874c69e61efd2d1a945db622e324db8b1d9
SHA512452b0ec06f53e4db3906a5c9299818d1591c69414a34c174ff27a371ecb0b36f12839ed484c84538d5bef0617fc75a3f7ff8ed6fbc334b3e3230b6b55981665e
-
Filesize
224KB
MD5afa953cc0e7f83f32375c90213a738bd
SHA1d2999a436c5afdec364b6fb812018ced2c73d6ad
SHA25699612450943221b35a6d4a54a6aef874c69e61efd2d1a945db622e324db8b1d9
SHA512452b0ec06f53e4db3906a5c9299818d1591c69414a34c174ff27a371ecb0b36f12839ed484c84538d5bef0617fc75a3f7ff8ed6fbc334b3e3230b6b55981665e
-
Filesize
224KB
MD5afa953cc0e7f83f32375c90213a738bd
SHA1d2999a436c5afdec364b6fb812018ced2c73d6ad
SHA25699612450943221b35a6d4a54a6aef874c69e61efd2d1a945db622e324db8b1d9
SHA512452b0ec06f53e4db3906a5c9299818d1591c69414a34c174ff27a371ecb0b36f12839ed484c84538d5bef0617fc75a3f7ff8ed6fbc334b3e3230b6b55981665e