Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe
Resource
win10v2004-20220812-en
General
-
Target
287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe
-
Size
84KB
-
MD5
187ebed20ef31dbf7e7fe6fce1feb28e
-
SHA1
10f6959294838dd05cfca8760b65c1761cc9bd09
-
SHA256
287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426
-
SHA512
53b334b0918849e3eeffa1b748109298b4cd0154c97715275adb679decee33568d3e7b2390ca1353382e6f7eef2fb9a9028ad6418c22e43e214126bb7c55227f
-
SSDEEP
768:DyV+hOvo/OswzKvgO0jAIWi3KEyUhL7b7Yqlf4JwQltjmtTBHi7Alg:DoFvOyES76Ezh/vYlJwAitTB3lg
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fueokij.exe -
Executes dropped EXE 1 IoCs
pid Process 1228 fueokij.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fueokij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fueokij = "C:\\Users\\Admin\\fueokij.exe" fueokij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1508 5040 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe 1228 fueokij.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5040 287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe 1228 fueokij.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1228 5040 287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe 83 PID 5040 wrote to memory of 1228 5040 287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe 83 PID 5040 wrote to memory of 1228 5040 287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe 83 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 1508 1228 fueokij.exe 85 PID 1228 wrote to memory of 5040 1228 fueokij.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe"C:\Users\Admin\AppData\Local\Temp\287926c2dfe50f65eb1cc91e7cbfaf35c351b1fda564de262a6f07c835c92426.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\fueokij.exe"C:\Users\Admin\fueokij.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 16762⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5040 -ip 50401⤵PID:1408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5022aff55990d5603b573b80b07d55d82
SHA1ba609b2a250b92dd76c4326d0fb72bd5468ce16f
SHA256f53d053d61c68bfdc7bcc2740059354bce8a7e23913c404858c9d003516a71f9
SHA5126a762e75eafebe9e9ac9361866ba08173688af73b7684c7641c49e1ce9f824a6a948527b9bf7652ae8b39b2a6ceb4a5db10795a4dcdbc752775ae33c751f591d
-
Filesize
84KB
MD5022aff55990d5603b573b80b07d55d82
SHA1ba609b2a250b92dd76c4326d0fb72bd5468ce16f
SHA256f53d053d61c68bfdc7bcc2740059354bce8a7e23913c404858c9d003516a71f9
SHA5126a762e75eafebe9e9ac9361866ba08173688af73b7684c7641c49e1ce9f824a6a948527b9bf7652ae8b39b2a6ceb4a5db10795a4dcdbc752775ae33c751f591d