Analysis
-
max time kernel
152s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe
Resource
win10v2004-20220812-en
General
-
Target
bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe
-
Size
224KB
-
MD5
96884909599d906cd04551865e754ccd
-
SHA1
3d8b8e698fe83314772a07c27177cf78a9675104
-
SHA256
bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f
-
SHA512
70586b9d8b7beb31fd20b226114294d52d22ac1524c50834cbc88b40ad6a58a3ee46afd64bd80042bc98154cc0be15e311baf552c707e910b52407668a7e5882
-
SSDEEP
3072:dXyqNsMoBusEZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax27:EqN5sgp4LnbmlrZ48
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuiiruq.exe -
Executes dropped EXE 1 IoCs
pid Process 1264 fuiiruq.exe -
Loads dropped DLL 2 IoCs
pid Process 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /s" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /o" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /x" fuiiruq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /d" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /q" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /i" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /y" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /m" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /r" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /p" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /z" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /e" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /c" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /w" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /l" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /j" bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /h" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /n" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /t" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /k" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /f" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /a" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /j" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /v" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /g" fuiiruq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiiruq = "C:\\Users\\Admin\\fuiiruq.exe /u" fuiiruq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe 1264 fuiiruq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 1264 fuiiruq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 1264 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 27 PID 904 wrote to memory of 1264 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 27 PID 904 wrote to memory of 1264 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 27 PID 904 wrote to memory of 1264 904 bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe"C:\Users\Admin\AppData\Local\Temp\bcf75d2af2eb5d8c996a61746eda7f867f264c23c471b2812c1855b1a1c81c0f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\fuiiruq.exe"C:\Users\Admin\fuiiruq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD512c7eb05d62bd0c87c9c1a86465b19f2
SHA14b01fad73df1d2faf384784c251717f05f782bc5
SHA2564db784eeba777f5f24ec2a5958ec4635c006a2e7ff30ff6cd03f937d85946dce
SHA5129ed3d3ea46b5f00f95ac0101892896f7ce4d20071f2778f0a50c8c9a42d563377f0f6317ec57ec59bcf194f084cbce2d9e1df2f698798af3232644951ab02a56
-
Filesize
224KB
MD512c7eb05d62bd0c87c9c1a86465b19f2
SHA14b01fad73df1d2faf384784c251717f05f782bc5
SHA2564db784eeba777f5f24ec2a5958ec4635c006a2e7ff30ff6cd03f937d85946dce
SHA5129ed3d3ea46b5f00f95ac0101892896f7ce4d20071f2778f0a50c8c9a42d563377f0f6317ec57ec59bcf194f084cbce2d9e1df2f698798af3232644951ab02a56
-
Filesize
224KB
MD512c7eb05d62bd0c87c9c1a86465b19f2
SHA14b01fad73df1d2faf384784c251717f05f782bc5
SHA2564db784eeba777f5f24ec2a5958ec4635c006a2e7ff30ff6cd03f937d85946dce
SHA5129ed3d3ea46b5f00f95ac0101892896f7ce4d20071f2778f0a50c8c9a42d563377f0f6317ec57ec59bcf194f084cbce2d9e1df2f698798af3232644951ab02a56
-
Filesize
224KB
MD512c7eb05d62bd0c87c9c1a86465b19f2
SHA14b01fad73df1d2faf384784c251717f05f782bc5
SHA2564db784eeba777f5f24ec2a5958ec4635c006a2e7ff30ff6cd03f937d85946dce
SHA5129ed3d3ea46b5f00f95ac0101892896f7ce4d20071f2778f0a50c8c9a42d563377f0f6317ec57ec59bcf194f084cbce2d9e1df2f698798af3232644951ab02a56