Analysis
-
max time kernel
178s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:58
Static task
static1
Behavioral task
behavioral1
Sample
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe
Resource
win10v2004-20221111-en
General
-
Target
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe
-
Size
140KB
-
MD5
5c6eb56fcd6cd24f8cb820204baeb920
-
SHA1
a6a77e7b22816b91e035bbed4bc98c12b0b2ae82
-
SHA256
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3
-
SHA512
35a08192c7672ead6b607a9b9439929338ef478670200bd1e87de198e913bdc6b7b98461ad84c5bcd73086267c85f304c67c3b92f8205f9086742be9d13d3e11
-
SSDEEP
3072:U9Pc7FuHCxABX562J7fT4PE6fUneYkLpE6H94oQZiENngW:jFufBJ1J7f8z9SOWzx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
huray.exe5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huray.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe -
Executes dropped EXE 1 IoCs
Processes:
huray.exepid process 308 huray.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
huray.exe5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /d" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /k" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /B" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /l" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /P" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /r" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /S" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /b" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /V" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /F" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /p" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /Q" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /A" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /j" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /I" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /q" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /g" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /R" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /y" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /T" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /h" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /W" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /n" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /c" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /t" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /i" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /J" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /C" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /M" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /a" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /D" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /G" huray.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /e" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /v" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /u" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /Z" 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /X" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /O" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /f" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /m" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /o" huray.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /E" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /w" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /L" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /z" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /K" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /Z" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /x" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /Y" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /U" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /H" huray.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huray = "C:\\Users\\Admin\\huray.exe /s" huray.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exehuray.exepid process 4560 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe 4560 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe 308 huray.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exehuray.exepid process 4560 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe 308 huray.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exedescription pid process target process PID 4560 wrote to memory of 308 4560 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe huray.exe PID 4560 wrote to memory of 308 4560 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe huray.exe PID 4560 wrote to memory of 308 4560 5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe huray.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe"C:\Users\Admin\AppData\Local\Temp\5f42cf2e7c1a16fbca6f303619c4608a0b61d2303f0fbf872a9bdff054382af3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\huray.exe"C:\Users\Admin\huray.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD58846503c7739686d04d01ab7dc7417e6
SHA1773af69281b730ef8284f277aa29b3b541d303db
SHA2560df61f73e89dce85a7745c756252abec9fc27bc2130a4b93960f75ed9eb3602f
SHA512e88a7bba52a6fd6467668381ada5052c7fa7b85276ef17c7e92548dda0a040368834b9d2683f925edf7a2f058c7f247b52b3d1eda7c1fef22ff29472be227715
-
Filesize
140KB
MD58846503c7739686d04d01ab7dc7417e6
SHA1773af69281b730ef8284f277aa29b3b541d303db
SHA2560df61f73e89dce85a7745c756252abec9fc27bc2130a4b93960f75ed9eb3602f
SHA512e88a7bba52a6fd6467668381ada5052c7fa7b85276ef17c7e92548dda0a040368834b9d2683f925edf7a2f058c7f247b52b3d1eda7c1fef22ff29472be227715