Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe
Resource
win10v2004-20220812-en
General
-
Target
e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe
-
Size
104KB
-
MD5
44476fddeb066870dc7601dfde7610e0
-
SHA1
40fc9b4cefc2d9a49edff906b718f57de57fefc5
-
SHA256
e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a
-
SHA512
414ca9d7b2995112283d4412b3ecf1e12d51f6130e73fb751a8f2e7051e83f4cdf87da213f5c749affa743c848106431e40b8f3ad1822eff29cb5224f31c9ea9
-
SSDEEP
1536:vCS6Njjtm+HBc+hFKNIqpOGQvLsTZF6oc9oXjLl0Ii:qe+FrKNZ3QvLsTMo3mIi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rueapom.exe -
Executes dropped EXE 1 IoCs
pid Process 3248 rueapom.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /h" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /b" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /j" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /w" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /c" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /a" e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /e" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /y" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /t" rueapom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rueapom = "C:\\Users\\Admin\\rueapom.exe /l" rueapom.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2296 e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe 2296 e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe 3248 rueapom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe 3248 rueapom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3248 2296 e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe 85 PID 2296 wrote to memory of 3248 2296 e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe 85 PID 2296 wrote to memory of 3248 2296 e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe"C:\Users\Admin\AppData\Local\Temp\e77c13a9f29a653041564c5cc35485e683d2a12c685741a0de81fceb7e932e9a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\rueapom.exe"C:\Users\Admin\rueapom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD561d2772b639e57f51044d51e99929ccc
SHA17b3474595d49d2d061cf3afb8ca0194f82afd260
SHA256a8875ba8eb3b7a5613c3dde4f8f84239fbf44790b8c25d9b2559a1e199a2a7fd
SHA512c41adb4a1ff8172388c737b7ba835f664165c424ca4fe70cf389f18dc63b37e90246fa7ddef2c707f2338f50fb9ee6a7a1d4bc8e89ae8a88b8691394e9d60ebd
-
Filesize
104KB
MD561d2772b639e57f51044d51e99929ccc
SHA17b3474595d49d2d061cf3afb8ca0194f82afd260
SHA256a8875ba8eb3b7a5613c3dde4f8f84239fbf44790b8c25d9b2559a1e199a2a7fd
SHA512c41adb4a1ff8172388c737b7ba835f664165c424ca4fe70cf389f18dc63b37e90246fa7ddef2c707f2338f50fb9ee6a7a1d4bc8e89ae8a88b8691394e9d60ebd