Analysis
-
max time kernel
152s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe
Resource
win10v2004-20220901-en
General
-
Target
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe
-
Size
200KB
-
MD5
0761d746220bc99525b423656c74e0cb
-
SHA1
c67e89fca0d53fe3cbdbd4512728f38446bdefae
-
SHA256
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8
-
SHA512
fef7bdaad1ee2c0db10f66d2c400de3e225f2333fbf2f9b208da3192f030206ae0566ad36e922cad2a20d2316abb0d3c8a73b0a5447ce7e945ccf1b6ec55d7fa
-
SSDEEP
6144:vmXx9SpWymPBeaSAOJ+7xi5eRed63qaCR8nIBK1:O3uLmPBeaSAOJ+7xi5eRed63qaC4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
muvon.exe6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muvon.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe -
Executes dropped EXE 1 IoCs
Processes:
muvon.exepid process 112 muvon.exe -
Loads dropped DLL 2 IoCs
Processes:
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exepid process 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
muvon.exe6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /b" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /Y" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /s" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /W" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /M" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /l" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /f" muvon.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /q" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /z" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /J" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /T" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /Z" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /i" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /w" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /v" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /E" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /N" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /R" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /K" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /U" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /I" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /L" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /C" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /c" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /u" muvon.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /S" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /p" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /m" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /F" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /G" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /V" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /A" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /g" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /P" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /D" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /a" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /j" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /n" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /t" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /B" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /o" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /O" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /h" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /e" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /d" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /H" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /k" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /r" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /X" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /Q" muvon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /H" 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\muvon = "C:\\Users\\Admin\\muvon.exe /y" muvon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exemuvon.exepid process 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe 112 muvon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exemuvon.exepid process 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe 112 muvon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exedescription pid process target process PID 1636 wrote to memory of 112 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe muvon.exe PID 1636 wrote to memory of 112 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe muvon.exe PID 1636 wrote to memory of 112 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe muvon.exe PID 1636 wrote to memory of 112 1636 6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe muvon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe"C:\Users\Admin\AppData\Local\Temp\6b250a2279311339300a496c82a554af57554fcc5dd78ade4469a9da475747c8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\muvon.exe"C:\Users\Admin\muvon.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\muvon.exeFilesize
200KB
MD5476d09357469920dbbe60154cb63c5a1
SHA1f75ebc86f62c3ed4886f6231c2e58ce8de2e51df
SHA256e6f6fd47edf6258e0346342d445fb2bd55b7ec284a87d21ea00cdd0f8d35105d
SHA512892570e954b4108036d8afce5a83c0a5c403429a7d95c1bcac7076467d9c4a7acbfe304c797978cb98f9e75e7ecf78d7ff66fd0d7f47440c3ef65607470251a7
-
C:\Users\Admin\muvon.exeFilesize
200KB
MD5476d09357469920dbbe60154cb63c5a1
SHA1f75ebc86f62c3ed4886f6231c2e58ce8de2e51df
SHA256e6f6fd47edf6258e0346342d445fb2bd55b7ec284a87d21ea00cdd0f8d35105d
SHA512892570e954b4108036d8afce5a83c0a5c403429a7d95c1bcac7076467d9c4a7acbfe304c797978cb98f9e75e7ecf78d7ff66fd0d7f47440c3ef65607470251a7
-
\Users\Admin\muvon.exeFilesize
200KB
MD5476d09357469920dbbe60154cb63c5a1
SHA1f75ebc86f62c3ed4886f6231c2e58ce8de2e51df
SHA256e6f6fd47edf6258e0346342d445fb2bd55b7ec284a87d21ea00cdd0f8d35105d
SHA512892570e954b4108036d8afce5a83c0a5c403429a7d95c1bcac7076467d9c4a7acbfe304c797978cb98f9e75e7ecf78d7ff66fd0d7f47440c3ef65607470251a7
-
\Users\Admin\muvon.exeFilesize
200KB
MD5476d09357469920dbbe60154cb63c5a1
SHA1f75ebc86f62c3ed4886f6231c2e58ce8de2e51df
SHA256e6f6fd47edf6258e0346342d445fb2bd55b7ec284a87d21ea00cdd0f8d35105d
SHA512892570e954b4108036d8afce5a83c0a5c403429a7d95c1bcac7076467d9c4a7acbfe304c797978cb98f9e75e7ecf78d7ff66fd0d7f47440c3ef65607470251a7
-
memory/112-59-0x0000000000000000-mapping.dmp
-
memory/1636-56-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB