Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:46
Static task
static1
Behavioral task
behavioral1
Sample
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe
Resource
win10v2004-20221111-en
General
-
Target
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe
-
Size
3.3MB
-
MD5
f1bdfc8f7724ed65d5b4a401e5cb3f5e
-
SHA1
cc067dbfb98419e90c6eabc659189bb285f9b4f6
-
SHA256
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733
-
SHA512
d9300942659b366c31e3466f7a00fa5a753257b4cea71a3fd4aee2eee6455273c43180aa46ef31810f2207745489494aa188406af13979d60dbf6d0ee9354648
-
SSDEEP
49152:X5L8gp7MCG9XmAudwgj/FjxUZUanSd+hW5Sj+C/7ICJXaejl8eO3TKmV:dvp7MnZmndBbFj6ZU9dKBhXakZte
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
001.exereguo_30656.exeirsetup.exepid process 1336 001.exe 1540 reguo_30656.exe 1424 irsetup.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe upx C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe upx \Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe upx \Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe upx \Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe upx C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe upx behavioral1/memory/1424-90-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral1/memory/1424-96-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral1/memory/1424-98-0x0000000000400000-0x0000000000527000-memory.dmp upx -
Loads dropped DLL 17 IoCs
Processes:
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe001.exereguo_30656.exeirsetup.exepid process 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 1336 001.exe 1336 001.exe 1336 001.exe 1540 reguo_30656.exe 1336 001.exe 1424 irsetup.exe 1424 irsetup.exe 1424 irsetup.exe 1540 reguo_30656.exe 1424 irsetup.exe 1424 irsetup.exe 1540 reguo_30656.exe 1540 reguo_30656.exe 1540 reguo_30656.exe 1540 reguo_30656.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
reguo_30656.exedescription ioc process File opened for modification \??\PhysicalDrive0 reguo_30656.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 8 IoCs
Processes:
reguo_30656.exeexplorer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 974e1dfca2c54644ba5caa740ba63064 reguo_30656.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid reguo_30656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd reguo_30656.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exepid process 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
reguo_30656.exepid process 1540 reguo_30656.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exeirsetup.exepid process 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 1424 irsetup.exe 1424 irsetup.exe 1424 irsetup.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exeexplorer.exe001.exedescription pid process target process PID 1756 wrote to memory of 1976 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe explorer.exe PID 1756 wrote to memory of 1976 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe explorer.exe PID 1756 wrote to memory of 1976 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe explorer.exe PID 1756 wrote to memory of 1976 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe explorer.exe PID 1080 wrote to memory of 788 1080 explorer.exe ctfmon.exe PID 1080 wrote to memory of 788 1080 explorer.exe ctfmon.exe PID 1080 wrote to memory of 788 1080 explorer.exe ctfmon.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1336 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe 001.exe PID 1756 wrote to memory of 1540 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe reguo_30656.exe PID 1756 wrote to memory of 1540 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe reguo_30656.exe PID 1756 wrote to memory of 1540 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe reguo_30656.exe PID 1756 wrote to memory of 1540 1756 71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe reguo_30656.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe PID 1336 wrote to memory of 1424 1336 001.exe irsetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe"C:\Users\Admin\AppData\Local\Temp\71b02b6fccc4e5eeb6d935d4f75123edc0ac593343e78b5e79d621e5344c9733.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\baidupack\001.exeC:\Users\Admin\AppData\Local\Temp\baidupack\001.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe__IRAOFF:520716 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\baidupack\001.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\baidupack\reguo_30656.exeC:\Users\Admin\AppData\Local\Temp\baidupack\reguo_30656.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1540
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵PID:788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
1.8MB
MD5c6e942b316b79e451666692414e51704
SHA19b4c620c3c2f6d3f80434f6fe04df786488fdc2c
SHA2561dd3837237affba36d87769222d0e44d484cbcf5bc74a4ab153958b74fefb44c
SHA5123595b69368b9dd57c9bdc06f1a4f5f667e28d8f71f568d3deb3676e459cf6315f4aa1ca93c712846d362a8f1aff2526a680c9658039e1a2ac9db922b161dcce5
-
Filesize
1.8MB
MD5c6e942b316b79e451666692414e51704
SHA19b4c620c3c2f6d3f80434f6fe04df786488fdc2c
SHA2561dd3837237affba36d87769222d0e44d484cbcf5bc74a4ab153958b74fefb44c
SHA5123595b69368b9dd57c9bdc06f1a4f5f667e28d8f71f568d3deb3676e459cf6315f4aa1ca93c712846d362a8f1aff2526a680c9658039e1a2ac9db922b161dcce5
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
852KB
MD56cc74c221e432635e50d0966be4b8c83
SHA1f2d8666d67ddc134cee40a54cef6cb82140eb162
SHA256f0885c97328a6b5f44f75b893404f6a3d5348f3a7b7e1391a647294d41437598
SHA512c77ab3c7d74101b98c11ac1ff55f502f2ed383510a91455462e36732e946a5796a303785a12df91ff56b3202e3d43c35df697a875b62dc253472cf057ec15a47
-
Filesize
1.8MB
MD5c6e942b316b79e451666692414e51704
SHA19b4c620c3c2f6d3f80434f6fe04df786488fdc2c
SHA2561dd3837237affba36d87769222d0e44d484cbcf5bc74a4ab153958b74fefb44c
SHA5123595b69368b9dd57c9bdc06f1a4f5f667e28d8f71f568d3deb3676e459cf6315f4aa1ca93c712846d362a8f1aff2526a680c9658039e1a2ac9db922b161dcce5
-
Filesize
158KB
MD5b62367fe2d02b8f47914b088a006d50c
SHA13743c953e48e6f3f76689423ba9c1ed25e9f86d3
SHA256cbd4c5b6b945620e8b65752dff5a0f0900fc5de2dda8daf3cdda68b1661420b7
SHA512c010e3cc736ac1e10c6af44132d831df34d09bf1e7d1e96fb5c9f571cade04462d442c4b0fd84de92dc68d753a0beab0b4081122d53d516406f0d3c1ec1e0dbb
-
Filesize
268KB
MD5928208161b61b8c36fa1a6095c1ccfab
SHA1958343a07c70b287d6ec72c4ee442c2f52152a72
SHA256765003875c50f30dda584893c440ceac2ef84aa911e06e62ebe9648ae739f654
SHA512dc4dee12fad7e1a733af341b5da7812f9d1bc4046d83cc51ab833dad0a5d2d7f58b30947c0c3e4c9009b00eb7cb7a0f9093a9bcb92aff8b7c3d5d5748c9d4e9e
-
Filesize
1.3MB
MD539257175ac9c90199c69aea1a7bcbda0
SHA16cf4a8dedf37d24ce902f34fa66120a214e1a2cc
SHA25684d5fb0a7cf1bc1e4bbd0de51d3b7eb04bb92af9a1fc3675601b382a5f11d9fc
SHA5124a71d0ac3df53b25509205e9ed0bf781cbefa2ba6307501ae336488c8a3f7f627b8d01f861adbf47986e168abab5a06b36848f87cbcf27fe846e5f0ffc3a9f53
-
Filesize
18KB
MD51c951bbcbc780046d6be1079a04870a4
SHA1a5bae7d838973154e6fac69b1c5ff7d2cda01906
SHA256d23676fbcf76355d1af68e7b32964b837243349920921b2ec74d97554809a65e
SHA51262c3686baed2232f7d8ddc8f48a41761812b5b2a67f3a689b7a43275f077842366abc13c7e8259613bfd9df25cf467e4001337c1454aec910abce121d551e2d8
-
Filesize
1.9MB
MD5763b532d651f0ad5e135d9b57bf4fba4
SHA123f1302f904a67a1fe0d48e11a435c2f36336196
SHA25650b3c45ede6fd2d77c4f040242b2174289767b18a3a084e7046133b05f93e173
SHA512a4ec0f5bfa30d3558935f4075a75aebf080ece324a550c573d8a424730693b030cd26b4862973e8da8937e610c287d64e96c2fd952b59324ed1822919a00737c
-
Filesize
2.2MB
MD50f0646b72a00c92d87321ec4d249534e
SHA165dd3479e2415053836ce65d49ac310f72e3803b
SHA2565fc33df64bf00db72c2bd36797239f2c4f0ad50284b3e16c239d0d170130d200
SHA512fd186c316a7da8c5180874f9e28d8ea57624ccbf661b50888008c2f2687340fa2142e0f491b616f948a100ebf64335e83d89969e3437b14b82c560ed7820f0e4