Analysis
-
max time kernel
157s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:57
Static task
static1
Behavioral task
behavioral1
Sample
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe
Resource
win10v2004-20220812-en
General
-
Target
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe
-
Size
84KB
-
MD5
44545089402d4861a29eafae8fdad916
-
SHA1
a12266a6e2721b453bcfdb4dd5ad9b4685f574da
-
SHA256
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd
-
SHA512
b4e006c41a47f7255435bcec0a13e1f28300172a355e2be5f145f961ed881c3d1b712406c1a53e262acc6670aec9e5752f022defade7a3aeced14ce0cbe2071a
-
SSDEEP
1536:KnOnMKQF9H8JA9sThtLX5TH35edD0LE3C3Ib/:VM/FeJNhtLRXkW6C4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" luipo.exe -
Executes dropped EXE 2 IoCs
Processes:
luipo.exeluipo.exepid process 1364 luipo.exe 1360 luipo.exe -
Loads dropped DLL 2 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exepid process 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe -
Adds Run key to start application 2 TTPs 27 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /k" 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /o" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /e" luipo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /w" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /m" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /b" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /p" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /s" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /c" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /x" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /d" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /a" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /f" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /n" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /z" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /i" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /q" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /j" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /r" luipo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /g" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /h" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /u" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /t" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /k" luipo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\luipo = "C:\\Users\\Admin\\luipo.exe /y" luipo.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum luipo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 luipo.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
luipo.exedescription ioc process File opened for modification C:\Users\Admin\c\autorun.inf luipo.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exedescription pid process target process PID 1144 set thread context of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1364 set thread context of 1360 1364 luipo.exe luipo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exepid process 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe 1360 luipo.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exeluipo.exepid process 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 1364 luipo.exe 1360 luipo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exeluipo.exedescription pid process target process PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1144 wrote to memory of 1604 1144 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe PID 1604 wrote to memory of 1364 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe luipo.exe PID 1604 wrote to memory of 1364 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe luipo.exe PID 1604 wrote to memory of 1364 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe luipo.exe PID 1604 wrote to memory of 1364 1604 9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe PID 1364 wrote to memory of 1360 1364 luipo.exe luipo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe"C:\Users\Admin\AppData\Local\Temp\9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\9a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd.exe712⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\luipo.exe"C:\Users\Admin\luipo.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\luipo.exe714⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD544545089402d4861a29eafae8fdad916
SHA1a12266a6e2721b453bcfdb4dd5ad9b4685f574da
SHA2569a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd
SHA512b4e006c41a47f7255435bcec0a13e1f28300172a355e2be5f145f961ed881c3d1b712406c1a53e262acc6670aec9e5752f022defade7a3aeced14ce0cbe2071a
-
Filesize
84KB
MD544545089402d4861a29eafae8fdad916
SHA1a12266a6e2721b453bcfdb4dd5ad9b4685f574da
SHA2569a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd
SHA512b4e006c41a47f7255435bcec0a13e1f28300172a355e2be5f145f961ed881c3d1b712406c1a53e262acc6670aec9e5752f022defade7a3aeced14ce0cbe2071a
-
Filesize
84KB
MD544545089402d4861a29eafae8fdad916
SHA1a12266a6e2721b453bcfdb4dd5ad9b4685f574da
SHA2569a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd
SHA512b4e006c41a47f7255435bcec0a13e1f28300172a355e2be5f145f961ed881c3d1b712406c1a53e262acc6670aec9e5752f022defade7a3aeced14ce0cbe2071a
-
Filesize
84KB
MD544545089402d4861a29eafae8fdad916
SHA1a12266a6e2721b453bcfdb4dd5ad9b4685f574da
SHA2569a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd
SHA512b4e006c41a47f7255435bcec0a13e1f28300172a355e2be5f145f961ed881c3d1b712406c1a53e262acc6670aec9e5752f022defade7a3aeced14ce0cbe2071a
-
Filesize
84KB
MD544545089402d4861a29eafae8fdad916
SHA1a12266a6e2721b453bcfdb4dd5ad9b4685f574da
SHA2569a360dee464cb9ca8934848c2ca84983e5c2b15421b485639110fc818b5a3edd
SHA512b4e006c41a47f7255435bcec0a13e1f28300172a355e2be5f145f961ed881c3d1b712406c1a53e262acc6670aec9e5752f022defade7a3aeced14ce0cbe2071a