Analysis
-
max time kernel
180s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 22:26
Static task
static1
Behavioral task
behavioral1
Sample
75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe
Resource
win10v2004-20221111-en
General
-
Target
75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe
-
Size
88KB
-
MD5
53f7b3562fedd9cd18050f7bd68e901d
-
SHA1
306ad9543ad03d81a246b348c3d522a0d1f3fa0a
-
SHA256
75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427
-
SHA512
75e3dc00f901dddba139070ee243736d5cd63b8b431dcc3cfe32365e587cdaf16b9363236ef12022f721b235af02004cbc6cdbbc293f57de9355aa05db1679ba
-
SSDEEP
1536:G/298IQ/JDHKa5LJW6/Z2NZQ1vDmNmoGj:AO8I8DHKuFOWNoGj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guepo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe -
Executes dropped EXE 1 IoCs
pid Process 944 guepo.exe -
Loads dropped DLL 2 IoCs
pid Process 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /q" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /t" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /x" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /b" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /z" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /c" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /f" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /k" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /d" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /m" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /r" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /y" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /w" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /a" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /l" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /p" guepo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /o" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /h" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /n" guepo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /i" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /u" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /v" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /g" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /s" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /r" 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /e" guepo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\guepo = "C:\\Users\\Admin\\guepo.exe /j" guepo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe 944 guepo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 944 guepo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 984 wrote to memory of 944 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 27 PID 984 wrote to memory of 944 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 27 PID 984 wrote to memory of 944 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 27 PID 984 wrote to memory of 944 984 75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe"C:\Users\Admin\AppData\Local\Temp\75d3083a85444979ece63e7dc4232fa983f61c2ff29845f4d791556e35bd6427.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\guepo.exe"C:\Users\Admin\guepo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD50a2179b903d1b0a0e62d016b59b76c6c
SHA1c8bc0e21ab8f7b64a72df9cb787b2309ea6a872f
SHA2562741ca9070c6b503a0b74e8803048375761779f924d4f5f1c465b2c523096194
SHA512f5dc35006be5397f13477c20dcdc1a931001c497b947c477c49a0e623a30871b48d4d7ff7859ffe5454b1575089a482922a45d586747df09b381fe111739c118
-
Filesize
88KB
MD50a2179b903d1b0a0e62d016b59b76c6c
SHA1c8bc0e21ab8f7b64a72df9cb787b2309ea6a872f
SHA2562741ca9070c6b503a0b74e8803048375761779f924d4f5f1c465b2c523096194
SHA512f5dc35006be5397f13477c20dcdc1a931001c497b947c477c49a0e623a30871b48d4d7ff7859ffe5454b1575089a482922a45d586747df09b381fe111739c118
-
Filesize
88KB
MD50a2179b903d1b0a0e62d016b59b76c6c
SHA1c8bc0e21ab8f7b64a72df9cb787b2309ea6a872f
SHA2562741ca9070c6b503a0b74e8803048375761779f924d4f5f1c465b2c523096194
SHA512f5dc35006be5397f13477c20dcdc1a931001c497b947c477c49a0e623a30871b48d4d7ff7859ffe5454b1575089a482922a45d586747df09b381fe111739c118
-
Filesize
88KB
MD50a2179b903d1b0a0e62d016b59b76c6c
SHA1c8bc0e21ab8f7b64a72df9cb787b2309ea6a872f
SHA2562741ca9070c6b503a0b74e8803048375761779f924d4f5f1c465b2c523096194
SHA512f5dc35006be5397f13477c20dcdc1a931001c497b947c477c49a0e623a30871b48d4d7ff7859ffe5454b1575089a482922a45d586747df09b381fe111739c118