Analysis
-
max time kernel
189s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe
Resource
win10v2004-20221111-en
General
-
Target
cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe
-
Size
92KB
-
MD5
8e4b700bb4dbad6bb9d09b41dac75c3d
-
SHA1
d4a6a3056b34da16ace905c75fdbe4124fdf84b9
-
SHA256
cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb
-
SHA512
f41b93e3bc6834aef96e64682833384442c1e54373a71bd2dfda95d58152f2d5d81a53ed2af8fe6cc28a5af804813d01ab7db5b7435a4142f97134d68e7fe6ec
-
SSDEEP
1536:5IibhPjjBkvWN/3HgGl+yocTzFJ0T72Vp3/:es7/H5BTzFJ0T72L/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bebud.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe -
Executes dropped EXE 1 IoCs
pid Process 1316 bebud.exe -
Loads dropped DLL 2 IoCs
pid Process 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /d" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /w" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /u" bebud.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /x" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /n" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /e" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /h" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /m" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /o" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /b" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /i" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /c" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /y" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /q" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /z" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /a" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /g" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /o" cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /v" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /l" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /k" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /p" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /j" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /s" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /f" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /t" bebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bebud = "C:\\Users\\Admin\\bebud.exe /r" bebud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe 1316 bebud.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 1316 bebud.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1316 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 28 PID 1676 wrote to memory of 1316 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 28 PID 1676 wrote to memory of 1316 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 28 PID 1676 wrote to memory of 1316 1676 cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe"C:\Users\Admin\AppData\Local\Temp\cb9fceae5074208f0225cbc843b0b687cd10c73c23f8e1cc53d9a777c5728edb.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\bebud.exe"C:\Users\Admin\bebud.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5a68a326c0c1c1e90b421802720b49b39
SHA1f5d890b453c1591aeea3aadf5dbcbcdc50e2d8df
SHA256b2db40606194749e82b6231a7e07f1114f71cf9084216ce574e1720ea44eeae0
SHA5126262863a30f0175ccf6b4e7f26b1135a9ac4176fbe0584ef255110ee02572a39142607befd8237149527fa68bbf3191eb638b57d31b3d7e0ba5a46c6a20cd615
-
Filesize
92KB
MD5a68a326c0c1c1e90b421802720b49b39
SHA1f5d890b453c1591aeea3aadf5dbcbcdc50e2d8df
SHA256b2db40606194749e82b6231a7e07f1114f71cf9084216ce574e1720ea44eeae0
SHA5126262863a30f0175ccf6b4e7f26b1135a9ac4176fbe0584ef255110ee02572a39142607befd8237149527fa68bbf3191eb638b57d31b3d7e0ba5a46c6a20cd615
-
Filesize
92KB
MD5a68a326c0c1c1e90b421802720b49b39
SHA1f5d890b453c1591aeea3aadf5dbcbcdc50e2d8df
SHA256b2db40606194749e82b6231a7e07f1114f71cf9084216ce574e1720ea44eeae0
SHA5126262863a30f0175ccf6b4e7f26b1135a9ac4176fbe0584ef255110ee02572a39142607befd8237149527fa68bbf3191eb638b57d31b3d7e0ba5a46c6a20cd615
-
Filesize
92KB
MD5a68a326c0c1c1e90b421802720b49b39
SHA1f5d890b453c1591aeea3aadf5dbcbcdc50e2d8df
SHA256b2db40606194749e82b6231a7e07f1114f71cf9084216ce574e1720ea44eeae0
SHA5126262863a30f0175ccf6b4e7f26b1135a9ac4176fbe0584ef255110ee02572a39142607befd8237149527fa68bbf3191eb638b57d31b3d7e0ba5a46c6a20cd615