Analysis
-
max time kernel
151s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:14
Static task
static1
Behavioral task
behavioral1
Sample
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe
Resource
win10v2004-20221111-en
General
-
Target
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe
-
Size
105KB
-
MD5
536ca09ffe8a16c8cb742b299fe1204d
-
SHA1
15fa786bcc63e7a60f215f250bd2934e2a9e0603
-
SHA256
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff
-
SHA512
a3c0fddc216639ca63cee3aefe4072f4560df39ece966d99a904f3b9ea7746a00855b08016b4d70a22e926643798412f1efacd810349a0cb5d88c4e7b9706829
-
SSDEEP
1536:InE9SNA6nsDbYHTJ26p4dTR6GMyYKOsNznn3WuKDWnCvORi1wM1EAf7nctzKFKU8:yVnsDbY12e7ahn3WCCWPKEMnyc9L64
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeruasoov.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ruasoov.exe -
Executes dropped EXE 2 IoCs
Processes:
ruasoov.exeruasoov.exepid process 2040 ruasoov.exe 1820 ruasoov.exe -
Loads dropped DLL 2 IoCs
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exepid process 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
ruasoov.exeddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /q" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /n" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /i" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /a" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /b" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /k" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /w" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /s" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /h" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /h" ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /r" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /e" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /z" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /u" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /v" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /o" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /m" ruasoov.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /t" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /y" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /p" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /d" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /f" ruasoov.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /l" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /x" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /g" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /c" ruasoov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruasoov = "C:\\Users\\Admin\\ruasoov.exe /j" ruasoov.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeruasoov.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ruasoov.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ruasoov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
ruasoov.exedescription ioc process File opened for modification C:\Users\Admin\c\autorun.inf ruasoov.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeruasoov.exedescription pid process target process PID 1668 set thread context of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 2040 set thread context of 1820 2040 ruasoov.exe ruasoov.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeruasoov.exepid process 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe 1820 ruasoov.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeruasoov.exeruasoov.exepid process 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe 2040 ruasoov.exe 1820 ruasoov.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exeruasoov.exedescription pid process target process PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 1668 wrote to memory of 684 1668 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe PID 684 wrote to memory of 2040 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ruasoov.exe PID 684 wrote to memory of 2040 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ruasoov.exe PID 684 wrote to memory of 2040 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ruasoov.exe PID 684 wrote to memory of 2040 684 ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe PID 2040 wrote to memory of 1820 2040 ruasoov.exe ruasoov.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe"C:\Users\Admin\AppData\Local\Temp\ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\ruasoov.exe"C:\Users\Admin\ruasoov.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\ruasoov.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5536ca09ffe8a16c8cb742b299fe1204d
SHA115fa786bcc63e7a60f215f250bd2934e2a9e0603
SHA256ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff
SHA512a3c0fddc216639ca63cee3aefe4072f4560df39ece966d99a904f3b9ea7746a00855b08016b4d70a22e926643798412f1efacd810349a0cb5d88c4e7b9706829
-
Filesize
105KB
MD5536ca09ffe8a16c8cb742b299fe1204d
SHA115fa786bcc63e7a60f215f250bd2934e2a9e0603
SHA256ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff
SHA512a3c0fddc216639ca63cee3aefe4072f4560df39ece966d99a904f3b9ea7746a00855b08016b4d70a22e926643798412f1efacd810349a0cb5d88c4e7b9706829
-
Filesize
105KB
MD5536ca09ffe8a16c8cb742b299fe1204d
SHA115fa786bcc63e7a60f215f250bd2934e2a9e0603
SHA256ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff
SHA512a3c0fddc216639ca63cee3aefe4072f4560df39ece966d99a904f3b9ea7746a00855b08016b4d70a22e926643798412f1efacd810349a0cb5d88c4e7b9706829
-
Filesize
105KB
MD5536ca09ffe8a16c8cb742b299fe1204d
SHA115fa786bcc63e7a60f215f250bd2934e2a9e0603
SHA256ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff
SHA512a3c0fddc216639ca63cee3aefe4072f4560df39ece966d99a904f3b9ea7746a00855b08016b4d70a22e926643798412f1efacd810349a0cb5d88c4e7b9706829
-
Filesize
105KB
MD5536ca09ffe8a16c8cb742b299fe1204d
SHA115fa786bcc63e7a60f215f250bd2934e2a9e0603
SHA256ddcfd76e848edc9f452652e6f662ba2eca121a3097ed9ea1267d0f3c5e3668ff
SHA512a3c0fddc216639ca63cee3aefe4072f4560df39ece966d99a904f3b9ea7746a00855b08016b4d70a22e926643798412f1efacd810349a0cb5d88c4e7b9706829