Analysis
-
max time kernel
227s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 02:17
Static task
static1
Behavioral task
behavioral1
Sample
963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe
Resource
win10v2004-20221111-en
General
-
Target
963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe
-
Size
112KB
-
MD5
04055df8a4d022df03ba279edc19e7e5
-
SHA1
5dd635633a01fa0d7318d620f4f19ad5200e22ce
-
SHA256
963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12
-
SHA512
efc4c1bb28b8351cf101776cac2533d755e0249ab524b3b9c9bad6cd41bc5853b098af98bbb0a34fd77abf67e9c584116bd733785865013e10929c3668265c56
-
SSDEEP
3072:7yRoDE9lJlfkX9kXWqgkXAkXAkXAkXtkX8kXQkXhkXIkX/kXdkX+kXmkXJkXMkXT:7yRoDgkX9kXWqgkXAkXAkXAkXtkX8kXl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juisu.exe -
Executes dropped EXE 1 IoCs
pid Process 268 juisu.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ juisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\juisu = "C:\\Users\\Admin\\juisu.exe" juisu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe 268 juisu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe 268 juisu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 268 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe 28 PID 1996 wrote to memory of 268 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe 28 PID 1996 wrote to memory of 268 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe 28 PID 1996 wrote to memory of 268 1996 963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe 28 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27 PID 268 wrote to memory of 1996 268 juisu.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe"C:\Users\Admin\AppData\Local\Temp\963ae44695002c677819552abfafcacb50f4c1d75f16a54967ce70ede6468c12.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\juisu.exe"C:\Users\Admin\juisu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD543941005cf02816429ff352bf0971b42
SHA1b290b7e9eabe189944a90fb5d0f5369fd3b0d81c
SHA2569bd72a55829303d67b0c3eaa6a98ecc37284d5252046b0c74f9d3b43ce85296c
SHA512a71f2648c901089054d09ffc318968bfdd9633359417df2df804d6a02a9480af075314f77d5d79332f784ad63f79cc89dc5b02eb96cb295fb5cc90ab04415219
-
Filesize
112KB
MD543941005cf02816429ff352bf0971b42
SHA1b290b7e9eabe189944a90fb5d0f5369fd3b0d81c
SHA2569bd72a55829303d67b0c3eaa6a98ecc37284d5252046b0c74f9d3b43ce85296c
SHA512a71f2648c901089054d09ffc318968bfdd9633359417df2df804d6a02a9480af075314f77d5d79332f784ad63f79cc89dc5b02eb96cb295fb5cc90ab04415219
-
Filesize
112KB
MD543941005cf02816429ff352bf0971b42
SHA1b290b7e9eabe189944a90fb5d0f5369fd3b0d81c
SHA2569bd72a55829303d67b0c3eaa6a98ecc37284d5252046b0c74f9d3b43ce85296c
SHA512a71f2648c901089054d09ffc318968bfdd9633359417df2df804d6a02a9480af075314f77d5d79332f784ad63f79cc89dc5b02eb96cb295fb5cc90ab04415219
-
Filesize
112KB
MD543941005cf02816429ff352bf0971b42
SHA1b290b7e9eabe189944a90fb5d0f5369fd3b0d81c
SHA2569bd72a55829303d67b0c3eaa6a98ecc37284d5252046b0c74f9d3b43ce85296c
SHA512a71f2648c901089054d09ffc318968bfdd9633359417df2df804d6a02a9480af075314f77d5d79332f784ad63f79cc89dc5b02eb96cb295fb5cc90ab04415219