Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 19:39
Static task
static1
Behavioral task
behavioral1
Sample
df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe
Resource
win10v2004-20220812-en
General
-
Target
df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe
-
Size
164KB
-
MD5
a0e996c924a00da0d517a41e8350b510
-
SHA1
44fb59f3480d60aa604c5a6937090980b64321a2
-
SHA256
df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166
-
SHA512
0ad146393edd90a97bea1f7ca3a289abb567dbccdb56c7bb1368818d2cb97ebd76a6ce46e1d5b87bc209c3d27c06bbfd594ea8b630060d63c88a99b86af700ef
-
SSDEEP
3072:WoHMk+jHIub8Vq0mEFlXPb+OXNJDtOdS7dcovBuoF+N7bZD16iYIQusGGTkLGFMW:OrH9QVqnAXPaAtOdS7dcovBuoF+N7bZY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiudul.exe -
Executes dropped EXE 1 IoCs
pid Process 4052 wiudul.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /h" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /x" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /p" wiudul.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /f" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /y" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /n" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /m" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /b" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /z" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /u" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /t" wiudul.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /q" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /d" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /i" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /k" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /v" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /c" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /g" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /h" df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /s" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /a" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /j" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /e" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /r" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /w" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /l" wiudul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiudul = "C:\\Users\\Admin\\wiudul.exe /o" wiudul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3220 df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe 3220 df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe 4052 wiudul.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3220 df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe 4052 wiudul.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4052 3220 df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe 80 PID 3220 wrote to memory of 4052 3220 df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe 80 PID 3220 wrote to memory of 4052 3220 df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe"C:\Users\Admin\AppData\Local\Temp\df46cf1fce4ee599df67db512b5ff31d94ae745722573319b577ca24f04ae166.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\wiudul.exe"C:\Users\Admin\wiudul.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD50a861451a3e1600a93341498b1966ea6
SHA1c5b452d810d89bec8118e7d798051449a9d1c4eb
SHA256caab6ddfe2b3dfb53ed33d975134d2920bdf2aee31ad6be97baee0f627dae4e0
SHA51266d3a2194bad05f4b83dcb3e602675939cbf373333f0e35c2c671ce0da81a5410e16fd7da1e7179950ea4d45aef00a33f99c2607ab7625cc5ca3b4e52b23388f
-
Filesize
164KB
MD50a861451a3e1600a93341498b1966ea6
SHA1c5b452d810d89bec8118e7d798051449a9d1c4eb
SHA256caab6ddfe2b3dfb53ed33d975134d2920bdf2aee31ad6be97baee0f627dae4e0
SHA51266d3a2194bad05f4b83dcb3e602675939cbf373333f0e35c2c671ce0da81a5410e16fd7da1e7179950ea4d45aef00a33f99c2607ab7625cc5ca3b4e52b23388f