Analysis
-
max time kernel
293s -
max time network
314s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe
Resource
win10v2004-20221111-en
General
-
Target
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe
-
Size
124KB
-
MD5
07a2c2291862a87199bdf44df08c3620
-
SHA1
ad1baf30a268a0040628065701bbe56bdae6df89
-
SHA256
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b
-
SHA512
7f61d99a307dd5ef99293a05a4386974b3f58cd373c280226c314379f9fc95b50266276e859c47b13d45b41f496acdc904bd3f7f48db14a0d27282fa5f29fa33
-
SSDEEP
1536:nLszl5YPhRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmE:LGjYPhkFoN3Oo1+FvfSW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exemoovu.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moovu.exe -
Executes dropped EXE 2 IoCs
Processes:
moovu.exenoareew.exepid process 1660 moovu.exe 1784 noareew.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exemoovu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation moovu.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exemoovu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moovu = "C:\\Users\\Admin\\moovu.exe /z" 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ moovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\noareew = "C:\\Users\\Admin\\noareew.exe /Q" moovu.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exemoovu.exepid process 952 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe 952 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe 1660 moovu.exe 1660 moovu.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exemoovu.exenoareew.exepid process 952 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe 1660 moovu.exe 1784 noareew.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exemoovu.exedescription pid process target process PID 952 wrote to memory of 1660 952 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe moovu.exe PID 952 wrote to memory of 1660 952 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe moovu.exe PID 952 wrote to memory of 1660 952 5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe moovu.exe PID 1660 wrote to memory of 1784 1660 moovu.exe noareew.exe PID 1660 wrote to memory of 1784 1660 moovu.exe noareew.exe PID 1660 wrote to memory of 1784 1660 moovu.exe noareew.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe"C:\Users\Admin\AppData\Local\Temp\5c3e2056006292c592ce7a3c3ea074e5f92bbc205864ab43079a37e0de6c897b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\moovu.exe"C:\Users\Admin\moovu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\noareew.exe"C:\Users\Admin\noareew.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5c0515f19f042c8409ca214c1335f6b31
SHA1701fc42528ef379a6ab49d42cf2a71718740f2a0
SHA256fdb8a86bf68d9dcacc3028018b57b91bf5b8d42eadb99ef32e39f52c0f23078f
SHA512f94e8defa869d0dada3215df8fb7b67f575dff59b7e73760cdf8d83e9429cd761226c9754b9c6288aa008d625233ec9050c7d5119b18e1e01d3421e17bb55d1f
-
Filesize
124KB
MD5c0515f19f042c8409ca214c1335f6b31
SHA1701fc42528ef379a6ab49d42cf2a71718740f2a0
SHA256fdb8a86bf68d9dcacc3028018b57b91bf5b8d42eadb99ef32e39f52c0f23078f
SHA512f94e8defa869d0dada3215df8fb7b67f575dff59b7e73760cdf8d83e9429cd761226c9754b9c6288aa008d625233ec9050c7d5119b18e1e01d3421e17bb55d1f
-
Filesize
124KB
MD5df632c1a71a6e044bb336d76a4cebb40
SHA133b948199c1f7ca27588c88915dfb8ea6fb83d18
SHA25651018bf76da41f9cbc6927e8c4b5222d6888cdd57f57394dbd7b41adab75a08a
SHA512d221b29a74edafc69bfe0a4f8f94fb85ae4eca39dff385f8627353a14fbac60d1ed4a45460be72e75650bbca4b90da8a6631bce444fd00f84720f3afd5bc0ebf
-
Filesize
124KB
MD5df632c1a71a6e044bb336d76a4cebb40
SHA133b948199c1f7ca27588c88915dfb8ea6fb83d18
SHA25651018bf76da41f9cbc6927e8c4b5222d6888cdd57f57394dbd7b41adab75a08a
SHA512d221b29a74edafc69bfe0a4f8f94fb85ae4eca39dff385f8627353a14fbac60d1ed4a45460be72e75650bbca4b90da8a6631bce444fd00f84720f3afd5bc0ebf