Analysis
-
max time kernel
166s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe
Resource
win10v2004-20221111-en
General
-
Target
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe
-
Size
284KB
-
MD5
262baaa5d33d34e6fc361466b8282f58
-
SHA1
0646d557bdec328a0d65ef419c9ad9f03b3db8bd
-
SHA256
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693
-
SHA512
c3dae84acbe4b893230375793a284c411cd9a3ac45442a0ff50bc9fab474a575ea85f3356cd22800913d5c44eade0cf41ad7d52512a72d06042e5023b4f27e58
-
SSDEEP
3072:/J2ybFy4sdi5dOLMxXtRfY6RTMlz97KMMBimtB5yVQBVY+6fradnRIv2m8yqbVNt:UyEi2idRRkeMM1f5quVYmRIKk44w
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exexuuca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuuca.exe -
Executes dropped EXE 1 IoCs
Processes:
xuuca.exepid process 1312 xuuca.exe -
Loads dropped DLL 2 IoCs
Processes:
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exepid process 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe -
Adds Run key to start application 2 TTPs 50 IoCs
Processes:
xuuca.execbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /p" xuuca.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /E" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /K" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /L" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /F" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /j" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /Z" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /q" cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /m" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /S" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /r" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /c" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /M" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /k" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /A" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /s" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /i" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /v" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /u" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /o" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /b" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /H" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /l" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /g" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /J" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /Y" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /V" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /y" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /G" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /X" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /t" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /N" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /U" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /T" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /h" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /O" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /w" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /e" xuuca.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /C" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /q" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /I" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /n" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /d" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /z" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /a" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /f" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /R" xuuca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuuca = "C:\\Users\\Admin\\xuuca.exe /D" xuuca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exexuuca.exepid process 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe 1312 xuuca.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exexuuca.exepid process 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe 1312 xuuca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exedescription pid process target process PID 2000 wrote to memory of 1312 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe xuuca.exe PID 2000 wrote to memory of 1312 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe xuuca.exe PID 2000 wrote to memory of 1312 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe xuuca.exe PID 2000 wrote to memory of 1312 2000 cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe xuuca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe"C:\Users\Admin\AppData\Local\Temp\cbc966874ef49538fd98f2e3c62ec267a44bbbbb342819da210dcbeaf94e0693.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\xuuca.exe"C:\Users\Admin\xuuca.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5638aa1a98abd3f5915efd12e3fa2174b
SHA1f8a6ecfd79b7ee36d1acfe1ea4a4196dbe45afd1
SHA25691683de5af95a524eeb46876a8efe1c1b4d8be67fe508ad96b47e2d9c13d2642
SHA512bfc201dc87eed1cfabd05c8c4915d7a9e59ed1d4b7dfc620564146ab9ba734b830eda902cdbcad911b230c6ad102f94bde851bba04456354de5c5b44a2ad80c9
-
Filesize
284KB
MD5638aa1a98abd3f5915efd12e3fa2174b
SHA1f8a6ecfd79b7ee36d1acfe1ea4a4196dbe45afd1
SHA25691683de5af95a524eeb46876a8efe1c1b4d8be67fe508ad96b47e2d9c13d2642
SHA512bfc201dc87eed1cfabd05c8c4915d7a9e59ed1d4b7dfc620564146ab9ba734b830eda902cdbcad911b230c6ad102f94bde851bba04456354de5c5b44a2ad80c9
-
Filesize
284KB
MD5638aa1a98abd3f5915efd12e3fa2174b
SHA1f8a6ecfd79b7ee36d1acfe1ea4a4196dbe45afd1
SHA25691683de5af95a524eeb46876a8efe1c1b4d8be67fe508ad96b47e2d9c13d2642
SHA512bfc201dc87eed1cfabd05c8c4915d7a9e59ed1d4b7dfc620564146ab9ba734b830eda902cdbcad911b230c6ad102f94bde851bba04456354de5c5b44a2ad80c9
-
Filesize
284KB
MD5638aa1a98abd3f5915efd12e3fa2174b
SHA1f8a6ecfd79b7ee36d1acfe1ea4a4196dbe45afd1
SHA25691683de5af95a524eeb46876a8efe1c1b4d8be67fe508ad96b47e2d9c13d2642
SHA512bfc201dc87eed1cfabd05c8c4915d7a9e59ed1d4b7dfc620564146ab9ba734b830eda902cdbcad911b230c6ad102f94bde851bba04456354de5c5b44a2ad80c9