Analysis
-
max time kernel
152s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe
Resource
win10v2004-20220812-en
General
-
Target
880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe
-
Size
974KB
-
MD5
e60e92bd14d49e88a8d88158500af069
-
SHA1
f451a07adab605cc9ff4910532cd08febf12769d
-
SHA256
880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1
-
SHA512
a13a1160e2764a76d0d951a593ae9c5627c102eb822538acc62b40afa135d42a6308d4265218190bf3b46362d3e2f357068e26f6f846006e7de909f69c508cf8
-
SSDEEP
12288:vhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4atDO9vJ/dXL+s8KFJG1GuK:1RmJkcoQricOIQxiZY1iat69lZ+m6wz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 680 fuko.exe 760 fuko.exe -
Deletes itself 1 IoCs
pid Process 968 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run fuko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{5E42621D-7DEE-6D93-BC89-5FBA6BE7BEB1} = "C:\\Users\\Admin\\AppData\\Roaming\\Yrlet\\fuko.exe" fuko.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000012326-69.dat autoit_exe behavioral1/files/0x000a000000012326-67.dat autoit_exe behavioral1/files/0x000a000000012326-71.dat autoit_exe behavioral1/files/0x000a000000012326-80.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 940 set thread context of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 680 set thread context of 760 680 fuko.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe 760 fuko.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe Token: SeSecurityPrivilege 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe Token: SeSecurityPrivilege 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 940 wrote to memory of 1068 940 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 28 PID 1068 wrote to memory of 680 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 29 PID 1068 wrote to memory of 680 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 29 PID 1068 wrote to memory of 680 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 29 PID 1068 wrote to memory of 680 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 29 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 680 wrote to memory of 760 680 fuko.exe 30 PID 760 wrote to memory of 1216 760 fuko.exe 18 PID 760 wrote to memory of 1216 760 fuko.exe 18 PID 760 wrote to memory of 1216 760 fuko.exe 18 PID 760 wrote to memory of 1216 760 fuko.exe 18 PID 760 wrote to memory of 1216 760 fuko.exe 18 PID 760 wrote to memory of 1304 760 fuko.exe 17 PID 760 wrote to memory of 1304 760 fuko.exe 17 PID 760 wrote to memory of 1304 760 fuko.exe 17 PID 760 wrote to memory of 1304 760 fuko.exe 17 PID 760 wrote to memory of 1304 760 fuko.exe 17 PID 760 wrote to memory of 1376 760 fuko.exe 16 PID 760 wrote to memory of 1376 760 fuko.exe 16 PID 760 wrote to memory of 1376 760 fuko.exe 16 PID 760 wrote to memory of 1376 760 fuko.exe 16 PID 760 wrote to memory of 1376 760 fuko.exe 16 PID 760 wrote to memory of 1068 760 fuko.exe 28 PID 760 wrote to memory of 1068 760 fuko.exe 28 PID 760 wrote to memory of 1068 760 fuko.exe 28 PID 760 wrote to memory of 1068 760 fuko.exe 28 PID 760 wrote to memory of 1068 760 fuko.exe 28 PID 1068 wrote to memory of 968 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 31 PID 1068 wrote to memory of 968 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 31 PID 1068 wrote to memory of 968 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 31 PID 1068 wrote to memory of 968 1068 880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe 31 PID 760 wrote to memory of 968 760 fuko.exe 31 PID 760 wrote to memory of 968 760 fuko.exe 31 PID 760 wrote to memory of 1688 760 fuko.exe 33 PID 760 wrote to memory of 1688 760 fuko.exe 33 PID 760 wrote to memory of 1688 760 fuko.exe 33 PID 760 wrote to memory of 1688 760 fuko.exe 33 PID 760 wrote to memory of 1688 760 fuko.exe 33 PID 760 wrote to memory of 328 760 fuko.exe 34 PID 760 wrote to memory of 328 760 fuko.exe 34 PID 760 wrote to memory of 328 760 fuko.exe 34 PID 760 wrote to memory of 328 760 fuko.exe 34 PID 760 wrote to memory of 328 760 fuko.exe 34 PID 760 wrote to memory of 2040 760 fuko.exe 35 PID 760 wrote to memory of 2040 760 fuko.exe 35 PID 760 wrote to memory of 2040 760 fuko.exe 35 PID 760 wrote to memory of 2040 760 fuko.exe 35 PID 760 wrote to memory of 2040 760 fuko.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe"C:\Users\Admin\AppData\Local\Temp\880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe"C:\Users\Admin\AppData\Local\Temp\880339c97ae7f35a39960bf9dc56b6ad7f38b8cfc9ea30a258656925f3908bf1.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\Yrlet\fuko.exe"C:\Users\Admin\AppData\Roaming\Yrlet\fuko.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Roaming\Yrlet\fuko.exe"C:\Users\Admin\AppData\Roaming\Yrlet\fuko.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2b3fe86c.bat"4⤵
- Deletes itself
PID:968
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1304
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD590abb76f3a17f3296b30cd1b35d06fea
SHA17e52c7b2d772378f03a54fbc72650e37d7674ea3
SHA256e29dce31aeb8960034cef4ee3c55892e4588221e1658d16848b6bfed3757a951
SHA5122a863b9613ce04d7c4152c352d048175033726ed3c9d9ef201ece4eaeb8cf1dbbdf91fc1b40556a4358193ee237fc75e406c3a2d7af332544d8acda82d6deceb
-
Filesize
398B
MD57af35a184c0be60760da5919ea888b54
SHA17e553008296e77309a20884482373c1a6439d034
SHA25618f3cfb4c4bd3c7a34bdc7149973f1ef98b1829670f2f8dec9644841a138257d
SHA5123966c08ec41af895fcb5f36ca77e2a88bab6236403724ee5e8a6b133a90ec12822229b4770ae7e2db2f51d7ffa7def1ae8c0196452bf03fd7cc095be33165ecf
-
Filesize
974KB
MD57760ee04a2a47a4df923ae7e66f54cd0
SHA14b9a0ffdab57532152c7ab9fba3efc204dc79452
SHA256ff261e40f5a991e2e973c2219a22f9110fff2aca57a40c299bc5ff125ee00de2
SHA51267ba13dd8732f73344a4494cc2e24c299f8c424f8de2835169fa5bdec6c2b3204ca27f05b3575d15a5202bc14de535c34228500f36a4f9d11aee9568bab5a528
-
Filesize
974KB
MD57760ee04a2a47a4df923ae7e66f54cd0
SHA14b9a0ffdab57532152c7ab9fba3efc204dc79452
SHA256ff261e40f5a991e2e973c2219a22f9110fff2aca57a40c299bc5ff125ee00de2
SHA51267ba13dd8732f73344a4494cc2e24c299f8c424f8de2835169fa5bdec6c2b3204ca27f05b3575d15a5202bc14de535c34228500f36a4f9d11aee9568bab5a528
-
Filesize
974KB
MD57760ee04a2a47a4df923ae7e66f54cd0
SHA14b9a0ffdab57532152c7ab9fba3efc204dc79452
SHA256ff261e40f5a991e2e973c2219a22f9110fff2aca57a40c299bc5ff125ee00de2
SHA51267ba13dd8732f73344a4494cc2e24c299f8c424f8de2835169fa5bdec6c2b3204ca27f05b3575d15a5202bc14de535c34228500f36a4f9d11aee9568bab5a528
-
Filesize
974KB
MD57760ee04a2a47a4df923ae7e66f54cd0
SHA14b9a0ffdab57532152c7ab9fba3efc204dc79452
SHA256ff261e40f5a991e2e973c2219a22f9110fff2aca57a40c299bc5ff125ee00de2
SHA51267ba13dd8732f73344a4494cc2e24c299f8c424f8de2835169fa5bdec6c2b3204ca27f05b3575d15a5202bc14de535c34228500f36a4f9d11aee9568bab5a528