Analysis
-
max time kernel
164s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe
Resource
win10v2004-20220812-en
General
-
Target
b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe
-
Size
268KB
-
MD5
1f9017794d6c735ecc43d978842811b2
-
SHA1
9e597ed9497770040a29671efaacf494a55a7760
-
SHA256
b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db
-
SHA512
c9cf7f29f527f59972af0958a1224d244babc115e5ff44cb5b007947c2b5150c7a5c096dab3c63288f409c47fcf786ab357eb021ee2e4423620c381aa0de0c08
-
SSDEEP
6144:d+5MxrHPr5dFvW8HG4hz8I4v2SsQVnByGcSnuXLH6MG:M5MxrHVdFvW8Hf/4v2eVnByLXLM
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seulo.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 seulo.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /g" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /a" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /f" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /j" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /h" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /l" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /e" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /s" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /k" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /y" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /c" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /i" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /z" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /b" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /t" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /u" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /o" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /w" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /p" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /d" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /x" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /r" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /q" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /m" seulo.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /l" b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /n" seulo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\seulo = "C:\\Users\\Admin\\seulo.exe /v" seulo.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe 1336 seulo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 1336 seulo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1336 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 28 PID 1648 wrote to memory of 1336 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 28 PID 1648 wrote to memory of 1336 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 28 PID 1648 wrote to memory of 1336 1648 b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe"C:\Users\Admin\AppData\Local\Temp\b909778b4c7f9f2eba826d471b6d9bb33e6e810222624791cce36ebdefa6d3db.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\seulo.exe"C:\Users\Admin\seulo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD587226b64a9a14dc95df43d6a32f90855
SHA176c80c8044516c03fe087b056d503d9c8021a459
SHA2562bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47
SHA5120356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d
-
Filesize
268KB
MD587226b64a9a14dc95df43d6a32f90855
SHA176c80c8044516c03fe087b056d503d9c8021a459
SHA2562bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47
SHA5120356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d
-
Filesize
268KB
MD587226b64a9a14dc95df43d6a32f90855
SHA176c80c8044516c03fe087b056d503d9c8021a459
SHA2562bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47
SHA5120356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d
-
Filesize
268KB
MD587226b64a9a14dc95df43d6a32f90855
SHA176c80c8044516c03fe087b056d503d9c8021a459
SHA2562bf8f77ae35257529551147d538c3446818da8b445f66a7c976cb5e3d5a49a47
SHA5120356e7b2569840007c0146a8a4c51bc0c722508396ecb7430a54c5d8f5893b4e44df006be2e7c82968a1213ed716bb7ff56a3aee0413bcb6ee109a9de9ecfd7d