Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe
Resource
win10v2004-20220812-en
General
-
Target
c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe
-
Size
56KB
-
MD5
0691ce0fb38be5a7a318760f65952903
-
SHA1
60b02970118ed4bd7dbb2770f3a0332f74323c0d
-
SHA256
c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf
-
SHA512
0bf80b8e1b2ec6c1a1ac787feafa863e9e3a353b3f3feeee1995f094b878de380f8b7a86b09928687391df16d14c6066789a3e68c72dca60841692ab61b52858
-
SSDEEP
768:x1HlPlCQya0Wo7sjEGf0mq/6/Q/9NF0+LEc8af3ts0E9l:xBCQtoghq2oS+Ljb3ts0E9l
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rauoya.exe -
Executes dropped EXE 1 IoCs
pid Process 532 rauoya.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rauoya.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rauoya = "C:\\Users\\Admin\\rauoya.exe" rauoya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe 532 rauoya.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe 532 rauoya.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 532 2728 c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe 79 PID 2728 wrote to memory of 532 2728 c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe 79 PID 2728 wrote to memory of 532 2728 c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe 79 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78 PID 532 wrote to memory of 2728 532 rauoya.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe"C:\Users\Admin\AppData\Local\Temp\c4c7d3074d54f06029b656faa0af2b652b07e2634c2b87ef4a489b10e10c1dbf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\rauoya.exe"C:\Users\Admin\rauoya.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a01ec9503d4b2d502cc46d9c1d0a4908
SHA16272ff0783c8d88a7353aa56992ffbf63ff80781
SHA2566fbcc1c7e16644b576165111e23dddb838adecb8ec8a58f945f7032a59417302
SHA5120eb087801f1d3d88079fc4d1aa13c7d9cfb939089e0119bae0273a2a7c1dd0626824278e48a829f0b312fdfa7633b0be29e228b45ac9d7f657959645fd8f650a
-
Filesize
56KB
MD5a01ec9503d4b2d502cc46d9c1d0a4908
SHA16272ff0783c8d88a7353aa56992ffbf63ff80781
SHA2566fbcc1c7e16644b576165111e23dddb838adecb8ec8a58f945f7032a59417302
SHA5120eb087801f1d3d88079fc4d1aa13c7d9cfb939089e0119bae0273a2a7c1dd0626824278e48a829f0b312fdfa7633b0be29e228b45ac9d7f657959645fd8f650a