Analysis
-
max time kernel
197s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe
Resource
win10v2004-20221111-en
General
-
Target
bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe
-
Size
272KB
-
MD5
3453a80218c794da67ba2776d2e91f20
-
SHA1
0f97d7b5a41b917c1c63890e11f872685835b803
-
SHA256
bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34
-
SHA512
d440481e7080f5b99e0adff93bca2b8c3a75d9cf1d1ac168c471827d2913cd3174772f13e58d4cef112f14ae603ed79d5a86c297a8e4757e1c5df33a38d91def
-
SSDEEP
3072:P4B9gmss0FvbVJznCRcz/hVFA9MSs/PLLj+Qm4U3YwgTeA3G7G:ggvbfznH7O9G/PLLxU3YwgT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guouda.exe -
Executes dropped EXE 1 IoCs
pid Process 1520 guouda.exe -
Loads dropped DLL 2 IoCs
pid Process 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /x" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /t" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /g" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /m" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /v" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /j" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /p" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /c" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /u" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /a" guouda.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /i" guouda.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /e" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /n" bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /l" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /h" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /w" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /q" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /y" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /n" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /s" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /f" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /o" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /r" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /d" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /b" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /k" guouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\guouda = "C:\\Users\\Admin\\guouda.exe /z" guouda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe 1520 guouda.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 1520 guouda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 1520 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 27 PID 340 wrote to memory of 1520 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 27 PID 340 wrote to memory of 1520 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 27 PID 340 wrote to memory of 1520 340 bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe"C:\Users\Admin\AppData\Local\Temp\bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\guouda.exe"C:\Users\Admin\guouda.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD53453a80218c794da67ba2776d2e91f20
SHA10f97d7b5a41b917c1c63890e11f872685835b803
SHA256bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34
SHA512d440481e7080f5b99e0adff93bca2b8c3a75d9cf1d1ac168c471827d2913cd3174772f13e58d4cef112f14ae603ed79d5a86c297a8e4757e1c5df33a38d91def
-
Filesize
272KB
MD53453a80218c794da67ba2776d2e91f20
SHA10f97d7b5a41b917c1c63890e11f872685835b803
SHA256bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34
SHA512d440481e7080f5b99e0adff93bca2b8c3a75d9cf1d1ac168c471827d2913cd3174772f13e58d4cef112f14ae603ed79d5a86c297a8e4757e1c5df33a38d91def
-
Filesize
272KB
MD53453a80218c794da67ba2776d2e91f20
SHA10f97d7b5a41b917c1c63890e11f872685835b803
SHA256bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34
SHA512d440481e7080f5b99e0adff93bca2b8c3a75d9cf1d1ac168c471827d2913cd3174772f13e58d4cef112f14ae603ed79d5a86c297a8e4757e1c5df33a38d91def
-
Filesize
272KB
MD53453a80218c794da67ba2776d2e91f20
SHA10f97d7b5a41b917c1c63890e11f872685835b803
SHA256bd17aa0259aefbd43db82f56ecb16bf6cb16265276b99583f0b88db668dfbe34
SHA512d440481e7080f5b99e0adff93bca2b8c3a75d9cf1d1ac168c471827d2913cd3174772f13e58d4cef112f14ae603ed79d5a86c297a8e4757e1c5df33a38d91def