Analysis
-
max time kernel
201s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:29
Static task
static1
Behavioral task
behavioral1
Sample
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
Resource
win10v2004-20221111-en
General
-
Target
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
-
Size
60KB
-
MD5
360d89d5aa19c242f346d939962cb590
-
SHA1
b5cd4284f8edbd39c88b7e587181cab6a0924261
-
SHA256
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c
-
SHA512
f7ad21fa811aa1471e17b6b90040556983b729373796e5a3879580e3facc074a23ed05f06ba1badd7e8e7c2f9cb346a7c415ca9d9095fb07849faef977a09e74
-
SSDEEP
768:k6qTD9xRIHgWTU6xUdPMXndo7sZUNMRrY20KtF1eNbw1o+pdok4I:h2DL6mJdsndo6UNMyetF1qw1o+pdSI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
fypuas.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fypuas.exe -
Executes dropped EXE 1 IoCs
Processes:
fypuas.exepid process 4372 fypuas.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe -
Adds Run key to start application 2 TTPs 51 IoCs
Processes:
fypuas.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /C" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /K" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /V" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /m" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /k" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /T" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /y" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /Y" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /M" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /U" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /w" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /r" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /v" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /P" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /g" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /n" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /B" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /e" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /b" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /S" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /t" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /o" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /O" fypuas.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /J" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /A" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /c" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /N" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /D" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /i" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /a" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /s" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /G" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /H" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /R" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /x" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /Z" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /I" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /E" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /h" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /p" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /Q" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /u" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /l" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /F" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /W" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /z" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /f" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /j" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /d" fypuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fypuas = "C:\\Users\\Admin\\fypuas.exe /L" fypuas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fypuas.exepid process 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe 4372 fypuas.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exefypuas.exepid process 3116 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 4372 fypuas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exefypuas.exedescription pid process target process PID 3116 wrote to memory of 4372 3116 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe fypuas.exe PID 3116 wrote to memory of 4372 3116 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe fypuas.exe PID 3116 wrote to memory of 4372 3116 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe fypuas.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe PID 4372 wrote to memory of 3116 4372 fypuas.exe 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe"C:\Users\Admin\AppData\Local\Temp\751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\fypuas.exe"C:\Users\Admin\fypuas.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5749e92e9e6884f6e2ff617d983c0b855
SHA188cc848688abe2b25d432a81342c158a3b1338be
SHA2569567aa69792adc897f273e454aef3bbe186e7853aa54861b730ce9fdc52fee26
SHA512e78b3171af6c1b23d4f7222606ce2c9d890c0f907701e5316e70a954c7dd67a2c80850c0d6aee75e9eb407d90939465e2fffe25a8434dd4a1ae4df06b794d321
-
Filesize
60KB
MD5749e92e9e6884f6e2ff617d983c0b855
SHA188cc848688abe2b25d432a81342c158a3b1338be
SHA2569567aa69792adc897f273e454aef3bbe186e7853aa54861b730ce9fdc52fee26
SHA512e78b3171af6c1b23d4f7222606ce2c9d890c0f907701e5316e70a954c7dd67a2c80850c0d6aee75e9eb407d90939465e2fffe25a8434dd4a1ae4df06b794d321