Analysis
-
max time kernel
205s -
max time network
239s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe
Resource
win10v2004-20221111-en
General
-
Target
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe
-
Size
124KB
-
MD5
444ec599045d30aa7bf2a7605fca0ebc
-
SHA1
e051128d573aa1a0db0b89925b6845030cb4e33d
-
SHA256
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709
-
SHA512
dcb27b84291dc788d639968b6d67f4e0afa7e825d752f4099adeb64843996d0ba4d6b8aaa6605fea7cf003078dc4430ab613cc9faf6447d5bafa05f66dd4214e
-
SSDEEP
1536:2Jszf5Y2ThRO/N69BH3OoGa+FLHjKKvRgrkOSodPNeG0h/y:kGhY2ThkFoN3Oo1+FvkScIq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exebvbuuv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bvbuuv.exe -
Executes dropped EXE 1 IoCs
Processes:
bvbuuv.exepid process 2284 bvbuuv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
bvbuuv.exe6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /V" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /r" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /B" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /W" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /P" 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /h" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /a" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /j" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /T" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /k" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /y" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /M" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /D" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /d" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /u" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /t" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /P" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /U" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /e" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /H" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /c" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /S" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /o" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /l" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /I" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /g" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /X" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /q" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /p" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /Z" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /n" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /i" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /N" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /f" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /R" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /x" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /m" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /Q" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /E" bvbuuv.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /s" bvbuuv.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /A" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /C" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /J" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /O" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /w" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /K" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /L" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /z" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /v" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /b" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /Y" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /G" bvbuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bvbuuv = "C:\\Users\\Admin\\bvbuuv.exe /F" bvbuuv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exebvbuuv.exepid process 3108 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe 3108 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe 2284 bvbuuv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exebvbuuv.exepid process 3108 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe 2284 bvbuuv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exedescription pid process target process PID 3108 wrote to memory of 2284 3108 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe bvbuuv.exe PID 3108 wrote to memory of 2284 3108 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe bvbuuv.exe PID 3108 wrote to memory of 2284 3108 6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe bvbuuv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe"C:\Users\Admin\AppData\Local\Temp\6d51c212a09f62e92f2df99594f8128be34b77195c96ce71cb4322c2d102d709.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\bvbuuv.exe"C:\Users\Admin\bvbuuv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5369d8e31445fa6336ad42a944230e5bb
SHA104a97d939a2ba2dcc9971bdc8c4810cc4901ff02
SHA256f0ac6e4d9e80c64528ccadf9bdfd4c4025e51eeb676b1cb9ef9735d229f4b75a
SHA51295d76a8d27e2f443d5b68403bdf756c6044460fc772a9bcc9ba501f524f1fa22cf935d65344c8607303f074008180cc113c06f5a7fbe669eb3d165a5fd7bf85f
-
Filesize
124KB
MD5369d8e31445fa6336ad42a944230e5bb
SHA104a97d939a2ba2dcc9971bdc8c4810cc4901ff02
SHA256f0ac6e4d9e80c64528ccadf9bdfd4c4025e51eeb676b1cb9ef9735d229f4b75a
SHA51295d76a8d27e2f443d5b68403bdf756c6044460fc772a9bcc9ba501f524f1fa22cf935d65344c8607303f074008180cc113c06f5a7fbe669eb3d165a5fd7bf85f