Analysis
-
max time kernel
147s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe
Resource
win10v2004-20220812-en
General
-
Target
e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe
-
Size
88KB
-
MD5
162eae2c670b100e361b187414c47414
-
SHA1
24636c1fdad5ad6d5a6102e9f532a53dd1b3df58
-
SHA256
e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20
-
SHA512
93178cbdec98b72a251cf4346500a661c2766617668d675bd82f66fe1dca03f1238ba948b1e6feecb2e69af6958875136c4733dad508ecb7c9e91c1095ba82f9
-
SSDEEP
1536:wEUXNkL8W1pSDcw3Hr+Pa4wYe7LFrknzKLqOP:5UXTTFFonzK9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuael.exe -
Executes dropped EXE 1 IoCs
pid Process 960 fuael.exe -
Loads dropped DLL 2 IoCs
pid Process 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /l" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /v" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /x" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /j" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /a" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /z" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /f" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /q" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /m" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /d" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /w" fuael.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /k" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /n" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /g" fuael.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /s" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /i" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /e" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /y" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /y" e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /r" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /o" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /p" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /h" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /u" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /t" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /b" fuael.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuael = "C:\\Users\\Admin\\fuael.exe /c" fuael.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe 960 fuael.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 960 fuael.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 960 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 27 PID 328 wrote to memory of 960 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 27 PID 328 wrote to memory of 960 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 27 PID 328 wrote to memory of 960 328 e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe"C:\Users\Admin\AppData\Local\Temp\e9981f5afde634f2d18eca1a8c35f66304f63fdb6afdd13f777978675cd91f20.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\fuael.exe"C:\Users\Admin\fuael.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD533eaef35a8fe6522f4045f5c82c921f0
SHA16e4c64fd6557a82b6b62b1c1cc661807d5143855
SHA25681923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347
SHA51262bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106
-
Filesize
88KB
MD533eaef35a8fe6522f4045f5c82c921f0
SHA16e4c64fd6557a82b6b62b1c1cc661807d5143855
SHA25681923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347
SHA51262bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106
-
Filesize
88KB
MD533eaef35a8fe6522f4045f5c82c921f0
SHA16e4c64fd6557a82b6b62b1c1cc661807d5143855
SHA25681923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347
SHA51262bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106
-
Filesize
88KB
MD533eaef35a8fe6522f4045f5c82c921f0
SHA16e4c64fd6557a82b6b62b1c1cc661807d5143855
SHA25681923066b3b93684d5a32ae29c3a69fd905b1c2c6466c9a47644db56d9cc4347
SHA51262bd50d967b65f5ab6783a1c8efcc766dd1c7f682aad9030eed0da191ec868ddac9ad9cac311b2aebac1129c5ca3443941a5304ec966b1ce050b5af40bf83106