Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe
Resource
win10v2004-20220812-en
General
-
Target
662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe
-
Size
240KB
-
MD5
a0f9141089f07892cf433d13c9557fd0
-
SHA1
414ab7d7dea03fe1a3b5887a11ab5c2b14fe263d
-
SHA256
662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97
-
SHA512
221736be9952cc848f78315928ef244d9c358bf9b6abab60069318203114026c2f764de796d49366a9c35056a32aae1d497d8098911bbcb944480e0d0948ffee
-
SSDEEP
3072:MGVU/RW+zbfMjS2BXeWBFcAfqTEBRjefrfRLfN561PHuh01W6goN:M2yFD2peScAfA0jCfr5671b
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puajon.exe -
Executes dropped EXE 1 IoCs
pid Process 1776 puajon.exe -
Loads dropped DLL 2 IoCs
pid Process 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /i" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /w" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /y" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /h" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /g" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /k" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /r" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /q" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /z" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /v" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /s" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /p" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /e" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /d" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /m" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /u" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /a" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /t" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /l" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /o" 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /b" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /n" puajon.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /c" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /j" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /o" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /x" puajon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\puajon = "C:\\Users\\Admin\\puajon.exe /f" puajon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe 1776 puajon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 1776 puajon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1776 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 26 PID 1184 wrote to memory of 1776 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 26 PID 1184 wrote to memory of 1776 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 26 PID 1184 wrote to memory of 1776 1184 662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe"C:\Users\Admin\AppData\Local\Temp\662f15eb95942698632e207f165a28a257fa41c7b5413281008bed1b35ce1c97.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\puajon.exe"C:\Users\Admin\puajon.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD562bc643907c2301ce5fe0f8315e80a8a
SHA1ea237452e768d8d438f4f60b8c7c8b730ff01d03
SHA256bda89d16c0d24659dc129b64aeae01570b4978411df0e800c351d07029de2f82
SHA512a864972b8a617c210121b5ff22fbb941923e392ad3b89160afd8a9c3f90aaf0b8aad09a024282ffebe0ff4d8249011b5fed1050668e1a31f643920b3d3f82807
-
Filesize
240KB
MD562bc643907c2301ce5fe0f8315e80a8a
SHA1ea237452e768d8d438f4f60b8c7c8b730ff01d03
SHA256bda89d16c0d24659dc129b64aeae01570b4978411df0e800c351d07029de2f82
SHA512a864972b8a617c210121b5ff22fbb941923e392ad3b89160afd8a9c3f90aaf0b8aad09a024282ffebe0ff4d8249011b5fed1050668e1a31f643920b3d3f82807
-
Filesize
240KB
MD562bc643907c2301ce5fe0f8315e80a8a
SHA1ea237452e768d8d438f4f60b8c7c8b730ff01d03
SHA256bda89d16c0d24659dc129b64aeae01570b4978411df0e800c351d07029de2f82
SHA512a864972b8a617c210121b5ff22fbb941923e392ad3b89160afd8a9c3f90aaf0b8aad09a024282ffebe0ff4d8249011b5fed1050668e1a31f643920b3d3f82807
-
Filesize
240KB
MD562bc643907c2301ce5fe0f8315e80a8a
SHA1ea237452e768d8d438f4f60b8c7c8b730ff01d03
SHA256bda89d16c0d24659dc129b64aeae01570b4978411df0e800c351d07029de2f82
SHA512a864972b8a617c210121b5ff22fbb941923e392ad3b89160afd8a9c3f90aaf0b8aad09a024282ffebe0ff4d8249011b5fed1050668e1a31f643920b3d3f82807