Analysis
-
max time kernel
171s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe
Resource
win10v2004-20221111-en
General
-
Target
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe
-
Size
196KB
-
MD5
2bc9aef0289d6c160dc0bee8a6b42781
-
SHA1
70b28036174d2822601458c1670b97da3625e491
-
SHA256
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934
-
SHA512
11e7cb4aac9f61c2755116cbc8e829e3cbeaa911df66dbb7817f6ed6b901d69e204b09356aa41d81b9dbe8f2568c166861d10af45faabce5a5a778e5c0144236
-
SSDEEP
6144:+c14K16oTJWvfU4+bOl8femcK/fObT/bGimszUf7Wq3:b3AoTMvs4+bOlNK/fObT/bGipE7F
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.execuanuv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cuanuv.exe -
Executes dropped EXE 1 IoCs
Processes:
cuanuv.exepid process 1180 cuanuv.exe -
Loads dropped DLL 2 IoCs
Processes:
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exepid process 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
cuanuv.exe658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /z" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /M" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /T" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /J" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /e" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /I" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /P" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /Z" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /X" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /g" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /R" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /S" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /B" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /r" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /G" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /H" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /v" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /U" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /F" 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /N" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /b" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /V" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /p" cuanuv.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /E" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /q" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /C" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /h" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /o" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /A" cuanuv.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /x" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /a" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /O" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /c" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /W" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /k" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /Q" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /n" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /s" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /m" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /t" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /d" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /F" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /l" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /y" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /u" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /D" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /i" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /j" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /L" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /w" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /Y" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /f" cuanuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\cuanuv = "C:\\Users\\Admin\\cuanuv.exe /K" cuanuv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.execuanuv.exepid process 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe 1180 cuanuv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.execuanuv.exepid process 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe 1180 cuanuv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exedescription pid process target process PID 1188 wrote to memory of 1180 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe cuanuv.exe PID 1188 wrote to memory of 1180 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe cuanuv.exe PID 1188 wrote to memory of 1180 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe cuanuv.exe PID 1188 wrote to memory of 1180 1188 658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe cuanuv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe"C:\Users\Admin\AppData\Local\Temp\658aeca5165dfcb2f6959bde36d7fb3323d51584788db52001c63054ff731934.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\cuanuv.exe"C:\Users\Admin\cuanuv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD511c205649b3396f765df0e7e3fe53b95
SHA150c0fb128f4dfc93f190abcb0b52fd9604098906
SHA25689d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7
SHA51293dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14
-
Filesize
196KB
MD511c205649b3396f765df0e7e3fe53b95
SHA150c0fb128f4dfc93f190abcb0b52fd9604098906
SHA25689d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7
SHA51293dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14
-
Filesize
196KB
MD511c205649b3396f765df0e7e3fe53b95
SHA150c0fb128f4dfc93f190abcb0b52fd9604098906
SHA25689d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7
SHA51293dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14
-
Filesize
196KB
MD511c205649b3396f765df0e7e3fe53b95
SHA150c0fb128f4dfc93f190abcb0b52fd9604098906
SHA25689d3fecff8c736921e0741df5aafba8933520ffdee94cbdd1da479478d528fe7
SHA51293dd7fb0f0adccf85a2d5060d9efe3208d24d02b403c5dcd4eb93cda5471d1336a70d61720af7e17d239b63ef3a78a4fee275f1e878a945a88454bff309d7a14