Analysis
-
max time kernel
158s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:55
Static task
static1
Behavioral task
behavioral1
Sample
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
Resource
win10v2004-20220901-en
General
-
Target
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
-
Size
112KB
-
MD5
05b7e9a1254b0be017a77b7db51ed440
-
SHA1
f7939cca6442cc80a654f810ffcd3bc2d2170501
-
SHA256
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee
-
SHA512
36d9f5781da1580937c04f64530e8055d7c3fe734467f7713beb39f99aedf72f6178506cf552a3772d1e2507cb629f7e014390361989edd104a57d316aadbdad
-
SSDEEP
3072:7yplt8/lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXl:7ypltekX9kXWqgkXAkXAkXAkXtkX8kXl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tugeb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tugeb.exe -
Executes dropped EXE 1 IoCs
Processes:
tugeb.exepid process 2328 tugeb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tugeb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tugeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tugeb = "C:\\Users\\Admin\\tugeb.exe" tugeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tugeb.exepid process 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe 2328 tugeb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exetugeb.exepid process 3036 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe 2328 tugeb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exetugeb.exedescription pid process target process PID 3036 wrote to memory of 2328 3036 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe tugeb.exe PID 3036 wrote to memory of 2328 3036 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe tugeb.exe PID 3036 wrote to memory of 2328 3036 f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe tugeb.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe PID 2328 wrote to memory of 3036 2328 tugeb.exe f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe"C:\Users\Admin\AppData\Local\Temp\f6b456f1ecda59ea210f171a3109a482ddb47e90200281e5f7192192fb017eee.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\tugeb.exe"C:\Users\Admin\tugeb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD571223c1eeb1210633dfb7ee06d15cea5
SHA188d6f22e27e5ee941ee58b6d42361be4ca9da519
SHA256fb30fe43efbcac06dcf088543ceda97a2c31686b41359b29c5edaf6f5b252d97
SHA512f9b436722977d4c76fb1d6f02fb55490fa1cf9f1e09a819e04a86bca3241fb727ae2ae2022c5e8a344df97557117ddf9834bfb11e0fcde3ec153afc3383e3b06
-
Filesize
112KB
MD571223c1eeb1210633dfb7ee06d15cea5
SHA188d6f22e27e5ee941ee58b6d42361be4ca9da519
SHA256fb30fe43efbcac06dcf088543ceda97a2c31686b41359b29c5edaf6f5b252d97
SHA512f9b436722977d4c76fb1d6f02fb55490fa1cf9f1e09a819e04a86bca3241fb727ae2ae2022c5e8a344df97557117ddf9834bfb11e0fcde3ec153afc3383e3b06