Analysis
-
max time kernel
152s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
Resource
win10v2004-20221111-en
General
-
Target
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
-
Size
172KB
-
MD5
577e2d7e85d2439c9ecf2bd47c6bb03b
-
SHA1
3b5a83ecd55f92bebf5315a8db50c3ea8affb5ef
-
SHA256
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2
-
SHA512
3ddb5a8effb96fd6f55ed1f0831dd37120d5c096a0da21cf9d5ce066dfb956b4f936038b78004198bbf840018a40e55e8f37b60e164ef01c291278aa9ad9784b
-
SSDEEP
1536:sZh0k1ZAYNMUAEeKWScfp3p9MQsoz2fRnleTtbjpeMyowLJn7:WpdWScfp3zsLt6bVejd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
muuix.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muuix.exe -
Executes dropped EXE 1 IoCs
Processes:
muuix.exepid process 824 muuix.exe -
Loads dropped DLL 2 IoCs
Processes:
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exepid process 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe -
Adds Run key to start application 2 TTPs 45 IoCs
Processes:
muuix.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /N" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /w" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /k" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /J" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /S" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /r" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /a" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /I" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /B" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /L" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /l" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /X" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /K" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /e" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /u" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /E" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /Y" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /z" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /s" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /v" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /H" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /Q" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /A" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /g" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /V" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /i" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /p" muuix.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /F" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /t" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /W" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /h" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /j" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /T" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /y" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /R" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /o" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /n" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /c" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /U" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /Z" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /m" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /f" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /b" muuix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\muuix = "C:\\Users\\Admin\\muuix.exe /G" muuix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
muuix.exepid process 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe 824 muuix.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exemuuix.exepid process 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe 824 muuix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exemuuix.exedescription pid process target process PID 1180 wrote to memory of 824 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe muuix.exe PID 1180 wrote to memory of 824 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe muuix.exe PID 1180 wrote to memory of 824 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe muuix.exe PID 1180 wrote to memory of 824 1180 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe muuix.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 824 wrote to memory of 1180 824 muuix.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe"C:\Users\Admin\AppData\Local\Temp\391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\muuix.exe"C:\Users\Admin\muuix.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD59fc1d3f62d11af3a6abe449d0a2ceea0
SHA16557d1e28b8c1d1700cf58f39701095efaa49e0e
SHA2565554fdae9b54e1bfde510d166d35466f656941335400b3a87da6264a4a0e939d
SHA5123d7b45c845a5b6df2bab2542957116a654e65a431fb570a2d1f7f8cbc96c880a526af4dac1ea6d5c7ecf22ff96a5a855310f6d3c1f4ec7273af3d5a251bbbc3b
-
Filesize
172KB
MD59fc1d3f62d11af3a6abe449d0a2ceea0
SHA16557d1e28b8c1d1700cf58f39701095efaa49e0e
SHA2565554fdae9b54e1bfde510d166d35466f656941335400b3a87da6264a4a0e939d
SHA5123d7b45c845a5b6df2bab2542957116a654e65a431fb570a2d1f7f8cbc96c880a526af4dac1ea6d5c7ecf22ff96a5a855310f6d3c1f4ec7273af3d5a251bbbc3b
-
Filesize
172KB
MD59fc1d3f62d11af3a6abe449d0a2ceea0
SHA16557d1e28b8c1d1700cf58f39701095efaa49e0e
SHA2565554fdae9b54e1bfde510d166d35466f656941335400b3a87da6264a4a0e939d
SHA5123d7b45c845a5b6df2bab2542957116a654e65a431fb570a2d1f7f8cbc96c880a526af4dac1ea6d5c7ecf22ff96a5a855310f6d3c1f4ec7273af3d5a251bbbc3b
-
Filesize
172KB
MD59fc1d3f62d11af3a6abe449d0a2ceea0
SHA16557d1e28b8c1d1700cf58f39701095efaa49e0e
SHA2565554fdae9b54e1bfde510d166d35466f656941335400b3a87da6264a4a0e939d
SHA5123d7b45c845a5b6df2bab2542957116a654e65a431fb570a2d1f7f8cbc96c880a526af4dac1ea6d5c7ecf22ff96a5a855310f6d3c1f4ec7273af3d5a251bbbc3b