Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:06
Static task
static1
Behavioral task
behavioral1
Sample
4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe
Resource
win10v2004-20220901-en
General
-
Target
4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe
-
Size
260KB
-
MD5
349815881bc9147ffc26843be2939ff0
-
SHA1
785f1230a94f7bb364fa713e402aeec31582a2ff
-
SHA256
4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0
-
SHA512
a111de01daa7e683f9042f46411bba9e255a7fefb3aa28e0c16aae5dd818621c537148d1ad384958d4879c600adc35457b79a4fc6f6139caefb75b276e3f1b81
-
SSDEEP
6144:V4HtUUp7WQn6mr1R4bKLnXejKloO6JU1J7QnpXZ7Ta9kzU2/pn:VkJp6Qn6mr1R4bKLnXaKaO6O1JAptH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duapuo.exe -
Executes dropped EXE 1 IoCs
pid Process 4380 duapuo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /X" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /L" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /P" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /H" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /M" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /x" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /O" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /z" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /s" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /f" duapuo.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /N" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /v" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /Y" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /i" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /R" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /u" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /K" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /l" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /k" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /Z" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /G" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /Q" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /n" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /e" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /C" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /F" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /h" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /B" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /p" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /a" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /q" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /y" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /S" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /w" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /I" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /D" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /W" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /J" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /U" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /b" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /j" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /r" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /E" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /T" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /o" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /g" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /t" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /c" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /d" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /V" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /m" duapuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duapuo = "C:\\Users\\Admin\\duapuo.exe /A" duapuo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe 4380 duapuo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4884 4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe 4380 duapuo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4380 4884 4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe 84 PID 4884 wrote to memory of 4380 4884 4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe 84 PID 4884 wrote to memory of 4380 4884 4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe"C:\Users\Admin\AppData\Local\Temp\4c0a3da7191ac24df28654d79ce018510ac7cba1d4137daabdea7eba01c5d5f0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\duapuo.exe"C:\Users\Admin\duapuo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD53eb1662e469b1d2e11139bc75c9d44fe
SHA1cb0c755cecc704aec21ba9f387664c6bad6712f8
SHA256f6a18563eaaae93d483718dbc22e9d3e38ca3554661c2694e1a90d7a74c39c12
SHA512d9d44f7b7356b4543f18ca27228556e3497882ee88e615e809d737bc12093661df3421c3ed5c8030098e4a25a2e24fff0deca46d63703d9f61749a9d9edb807f
-
Filesize
260KB
MD53eb1662e469b1d2e11139bc75c9d44fe
SHA1cb0c755cecc704aec21ba9f387664c6bad6712f8
SHA256f6a18563eaaae93d483718dbc22e9d3e38ca3554661c2694e1a90d7a74c39c12
SHA512d9d44f7b7356b4543f18ca27228556e3497882ee88e615e809d737bc12093661df3421c3ed5c8030098e4a25a2e24fff0deca46d63703d9f61749a9d9edb807f