Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe
Resource
win10v2004-20220812-en
General
-
Target
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe
-
Size
224KB
-
MD5
198c4ff11d5ba6d09b23d23eac7c1fc8
-
SHA1
022dd063f2bbf27f96c4d6142e4386954f11ad2a
-
SHA256
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587
-
SHA512
f7dd6617fcfd56e9e182ef9bb37e51cf8be764a26c5302460f458fc56e8ea602d1b1fd4d8cb08694e2473614d7426384c6ab7971830cf00638b4f6ed478fb9a8
-
SSDEEP
3072:bb3N87hBQQoZV7l2mclfj4Uvx+9sNxu+2eRcKgsU61JkkX39RLrw4ySKUbax2+gr:nNXt74L76nrZ3y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exefeuuli.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" feuuli.exe -
Executes dropped EXE 1 IoCs
Processes:
feuuli.exepid process 4968 feuuli.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exefeuuli.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /q" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /t" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /p" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /x" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /y" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /h" feuuli.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /s" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /k" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /u" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /i" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /z" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /v" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /o" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /b" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /r" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /g" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /e" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /d" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /l" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /c" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /w" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /f" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /a" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /n" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /t" 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /m" feuuli.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feuuli = "C:\\Users\\Admin\\feuuli.exe /j" feuuli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exefeuuli.exepid process 3912 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe 3912 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe 4968 feuuli.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exefeuuli.exepid process 3912 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe 4968 feuuli.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exedescription pid process target process PID 3912 wrote to memory of 4968 3912 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe feuuli.exe PID 3912 wrote to memory of 4968 3912 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe feuuli.exe PID 3912 wrote to memory of 4968 3912 7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe feuuli.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe"C:\Users\Admin\AppData\Local\Temp\7c8f1ddded87522ac12028e123a6912acc86edc1a252f9eec646baaf0b1fb587.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\feuuli.exe"C:\Users\Admin\feuuli.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD55ce0f7486fc4d659712e65868030387a
SHA1983c2187702c0a8a05105d0a209f234f2c416797
SHA256a345c755092778088f4d3d63216ea53c495f31c461a9789629dece6258dbb6ea
SHA5128a6431f0f9c6a8008b0a2c65be521764f06893276f1c0681296e484b05f78c3a257b1e344f54fa43c343bf4ab1cb08381e3339508d20ad46763bad1b9a538c56
-
Filesize
224KB
MD55ce0f7486fc4d659712e65868030387a
SHA1983c2187702c0a8a05105d0a209f234f2c416797
SHA256a345c755092778088f4d3d63216ea53c495f31c461a9789629dece6258dbb6ea
SHA5128a6431f0f9c6a8008b0a2c65be521764f06893276f1c0681296e484b05f78c3a257b1e344f54fa43c343bf4ab1cb08381e3339508d20ad46763bad1b9a538c56