Analysis
-
max time kernel
152s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe
Resource
win10v2004-20220901-en
General
-
Target
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe
-
Size
212KB
-
MD5
187fbb77103a8daf0bd9f8e0ad3e6a80
-
SHA1
e0bcb7e771c4e0314ea1e6edb1e500eb166ea8b9
-
SHA256
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0
-
SHA512
6a7616b966699859a4042103c68c1cdc23438c95f0986be64f9a8a68e6545f496e724c365b6999f8db090f02478a51c912313d4918750fa313d88ad97b29b46b
-
SSDEEP
6144:ep4VqIrqJQNbufrI4ukDnx/8vtvwzsmMAEu3Wev5kBirl87VFt6En9x7Xf7oufax:ep4zmGbMrI4ukDnx/8vtvwzsmMAEGHv9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.execeofuf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceofuf.exe -
Executes dropped EXE 1 IoCs
Processes:
ceofuf.exepid process 1416 ceofuf.exe -
Loads dropped DLL 2 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exepid process 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe -
Adds Run key to start application 2 TTPs 53 IoCs
Processes:
ceofuf.exe73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /j" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /K" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /l" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /C" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /S" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /g" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /s" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /v" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /f" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /c" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /i" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /A" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /q" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /h" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /b" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /F" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /J" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /a" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /r" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /T" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /D" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /z" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /R" ceofuf.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /d" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /t" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /B" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /M" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /m" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /p" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /A" 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /w" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /u" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /G" ceofuf.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /Z" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /X" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /k" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /V" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /Q" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /y" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /e" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /o" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /I" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /n" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /Y" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /H" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /W" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /P" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /E" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /U" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /N" ceofuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceofuf = "C:\\Users\\Admin\\ceofuf.exe /L" ceofuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.execeofuf.exepid process 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe 1416 ceofuf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.execeofuf.exepid process 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe 1416 ceofuf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exedescription pid process target process PID 544 wrote to memory of 1416 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe ceofuf.exe PID 544 wrote to memory of 1416 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe ceofuf.exe PID 544 wrote to memory of 1416 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe ceofuf.exe PID 544 wrote to memory of 1416 544 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe ceofuf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe"C:\Users\Admin\AppData\Local\Temp\73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\ceofuf.exe"C:\Users\Admin\ceofuf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD567f1ce5e21dc325a3229d97d4cfe64cd
SHA1591c4e747be6d4d742d206619d77a245daf26637
SHA2566061cd0e3e4d07dc09be02d20b92ff9a907a44c8fcd4411b3125052f3ba892d6
SHA512f05d13b518be01daaf8aa7adc65d36b32c684f12120c0b9dca40d14e51adcd7682a2e6e3615975fac11d5ce7a83d68b67e7ed6fb0e8aa7c107604527e33c0b9a
-
Filesize
212KB
MD567f1ce5e21dc325a3229d97d4cfe64cd
SHA1591c4e747be6d4d742d206619d77a245daf26637
SHA2566061cd0e3e4d07dc09be02d20b92ff9a907a44c8fcd4411b3125052f3ba892d6
SHA512f05d13b518be01daaf8aa7adc65d36b32c684f12120c0b9dca40d14e51adcd7682a2e6e3615975fac11d5ce7a83d68b67e7ed6fb0e8aa7c107604527e33c0b9a
-
Filesize
212KB
MD567f1ce5e21dc325a3229d97d4cfe64cd
SHA1591c4e747be6d4d742d206619d77a245daf26637
SHA2566061cd0e3e4d07dc09be02d20b92ff9a907a44c8fcd4411b3125052f3ba892d6
SHA512f05d13b518be01daaf8aa7adc65d36b32c684f12120c0b9dca40d14e51adcd7682a2e6e3615975fac11d5ce7a83d68b67e7ed6fb0e8aa7c107604527e33c0b9a
-
Filesize
212KB
MD567f1ce5e21dc325a3229d97d4cfe64cd
SHA1591c4e747be6d4d742d206619d77a245daf26637
SHA2566061cd0e3e4d07dc09be02d20b92ff9a907a44c8fcd4411b3125052f3ba892d6
SHA512f05d13b518be01daaf8aa7adc65d36b32c684f12120c0b9dca40d14e51adcd7682a2e6e3615975fac11d5ce7a83d68b67e7ed6fb0e8aa7c107604527e33c0b9a