Analysis
-
max time kernel
169s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 03:46
Static task
static1
Behavioral task
behavioral1
Sample
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe
Resource
win10v2004-20220812-en
General
-
Target
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe
-
Size
128KB
-
MD5
58a6be3aeede70cb86d871bf2c6a0179
-
SHA1
94670c59d976936b64b255f19d96ef68da4230a0
-
SHA256
96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9
-
SHA512
205ad31b4853bbb34e23a332f2f76a9d9c092df0ee8d7fc1904ac8a9b3cbbf38b7624b042b2c03d11b3fcc56f1969de4cf0f0ef245007ccde81266d16eb66926
-
SSDEEP
3072:AEe7VUe3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSsW:e2e3yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beuuwo.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 beuuwo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beuuwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beuuwo = "C:\\Users\\Admin\\beuuwo.exe" beuuwo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe 5096 beuuwo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 540 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 5096 beuuwo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 5096 540 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 82 PID 540 wrote to memory of 5096 540 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 82 PID 540 wrote to memory of 5096 540 96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe 82 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41 PID 5096 wrote to memory of 540 5096 beuuwo.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe"C:\Users\Admin\AppData\Local\Temp\96f059fe686b32f347e49178446cdb4255056592fea58f9afc82ee61390d0cb9.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\beuuwo.exe"C:\Users\Admin\beuuwo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD52fe746efc76275da5319e35127c34ed5
SHA1457c248c3d0480f7b5cee2bcf58599a85142e504
SHA2567614b805b186b6c662dbaae19bdc06b1e5924905c97c4baa42f13d26b2d08a10
SHA512975ed002365e0225815bc09e113625ee29f35fd048e0b08d29b46f48731dd3e3306593e87754f28e4b43e4bb79655ea65fb672ae892c1e3bf810799a6cefe2c8
-
Filesize
128KB
MD52fe746efc76275da5319e35127c34ed5
SHA1457c248c3d0480f7b5cee2bcf58599a85142e504
SHA2567614b805b186b6c662dbaae19bdc06b1e5924905c97c4baa42f13d26b2d08a10
SHA512975ed002365e0225815bc09e113625ee29f35fd048e0b08d29b46f48731dd3e3306593e87754f28e4b43e4bb79655ea65fb672ae892c1e3bf810799a6cefe2c8