Analysis
-
max time kernel
151s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:22
Static task
static1
Behavioral task
behavioral1
Sample
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe
Resource
win10v2004-20221111-en
General
-
Target
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe
-
Size
240KB
-
MD5
36feb9dd363c26cd0933826389f7acb0
-
SHA1
7308ff674ed3d0112dd22bebcd953ea3889c5326
-
SHA256
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d
-
SHA512
75605489ac4681545fcb4688c82219af4d46fa7c0832cb0e3e25f100f8592921e39f6fc386e0474417d1307b231f1405301005420ea9a14515fbd77252a8949f
-
SSDEEP
3072:vkBGJlT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5czHaL:vx50UGKGkFRKfeoztOO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exebeupiuz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beupiuz.exe -
Executes dropped EXE 1 IoCs
Processes:
beupiuz.exepid process 776 beupiuz.exe -
Loads dropped DLL 2 IoCs
Processes:
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exepid process 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe -
Adds Run key to start application 2 TTPs 28 IoCs
Processes:
beupiuz.execce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /h" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /f" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /p" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /y" cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /c" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /g" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /e" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /r" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /t" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /o" beupiuz.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /q" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /l" beupiuz.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /i" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /s" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /d" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /n" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /u" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /w" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /x" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /b" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /v" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /k" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /j" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /m" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /a" beupiuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\beupiuz = "C:\\Users\\Admin\\beupiuz.exe /z" beupiuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exebeupiuz.exepid process 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe 776 beupiuz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exebeupiuz.exepid process 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe 776 beupiuz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exedescription pid process target process PID 2036 wrote to memory of 776 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe beupiuz.exe PID 2036 wrote to memory of 776 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe beupiuz.exe PID 2036 wrote to memory of 776 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe beupiuz.exe PID 2036 wrote to memory of 776 2036 cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe beupiuz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe"C:\Users\Admin\AppData\Local\Temp\cce937309949956f29cbee382d0507998fdd5cbb5520a8aaf10ab3d366fd699d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\beupiuz.exe"C:\Users\Admin\beupiuz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\beupiuz.exeFilesize
240KB
MD5eb3bec37dcadb0558bdfab6455b4eab3
SHA1ba09513874254d8331544c3ca49d86ac10eb739d
SHA256d31fb17981c23ed0fdd81c26aae1ff1fb6fe48550eecdbabd2deced2a3d0a1ba
SHA5122779830c5639d27c78c715cb5f270231eb4fb55e3184d3217aa6f521982d196f1d3d04c95ce878d93ac5c2bc2cb37494af4f3db6540c9d85932e6c322cfc11d5
-
C:\Users\Admin\beupiuz.exeFilesize
240KB
MD5eb3bec37dcadb0558bdfab6455b4eab3
SHA1ba09513874254d8331544c3ca49d86ac10eb739d
SHA256d31fb17981c23ed0fdd81c26aae1ff1fb6fe48550eecdbabd2deced2a3d0a1ba
SHA5122779830c5639d27c78c715cb5f270231eb4fb55e3184d3217aa6f521982d196f1d3d04c95ce878d93ac5c2bc2cb37494af4f3db6540c9d85932e6c322cfc11d5
-
\Users\Admin\beupiuz.exeFilesize
240KB
MD5eb3bec37dcadb0558bdfab6455b4eab3
SHA1ba09513874254d8331544c3ca49d86ac10eb739d
SHA256d31fb17981c23ed0fdd81c26aae1ff1fb6fe48550eecdbabd2deced2a3d0a1ba
SHA5122779830c5639d27c78c715cb5f270231eb4fb55e3184d3217aa6f521982d196f1d3d04c95ce878d93ac5c2bc2cb37494af4f3db6540c9d85932e6c322cfc11d5
-
\Users\Admin\beupiuz.exeFilesize
240KB
MD5eb3bec37dcadb0558bdfab6455b4eab3
SHA1ba09513874254d8331544c3ca49d86ac10eb739d
SHA256d31fb17981c23ed0fdd81c26aae1ff1fb6fe48550eecdbabd2deced2a3d0a1ba
SHA5122779830c5639d27c78c715cb5f270231eb4fb55e3184d3217aa6f521982d196f1d3d04c95ce878d93ac5c2bc2cb37494af4f3db6540c9d85932e6c322cfc11d5
-
memory/776-59-0x0000000000000000-mapping.dmp
-
memory/2036-56-0x0000000076381000-0x0000000076383000-memory.dmpFilesize
8KB