Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 22:56
Static task
static1
Behavioral task
behavioral1
Sample
ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe
Resource
win10v2004-20221111-en
General
-
Target
ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe
-
Size
192KB
-
MD5
74e623e60efda5cbe2329b07ade8fabf
-
SHA1
5681e47d358fb9fd2a6fe5f9ee2d4df0a857e0f5
-
SHA256
ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651
-
SHA512
04359f386b1d1261ba0210e73d61ac2c45e3d70ece32b1c8b5fa16853d128a36a5e888be9927b0e9f98911364ebb404c8b9dd7f98496037db7e65124706cd39c
-
SSDEEP
1536:hxHABQruHlTaPRi4iti93MH9iV6MRfWzzp3BHReQbIYL2XoPLJB514R9/dJqi/7:j2QraTIRi4itiSHXzp3uYTPLJOhD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puuyia.exe -
Executes dropped EXE 1 IoCs
pid Process 956 puuyia.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /f" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /o" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /c" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /q" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /l" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /i" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /v" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /p" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /g" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /n" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /x" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /k" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /u" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /m" puuyia.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /d" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /s" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /h" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /a" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /e" puuyia.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /t" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /z" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /y" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /b" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /j" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /w" puuyia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\puuyia = "C:\\Users\\Admin\\puuyia.exe /t" ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe 956 puuyia.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 956 puuyia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 956 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 28 PID 1972 wrote to memory of 956 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 28 PID 1972 wrote to memory of 956 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 28 PID 1972 wrote to memory of 956 1972 ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe"C:\Users\Admin\AppData\Local\Temp\ab39e04492a05386f8686c87040be6a49879d629cd922d3af1d91691224fc651.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\puuyia.exe"C:\Users\Admin\puuyia.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD55bd9ca4345bc255f7c96834cf8fd6b33
SHA11ac7ce55fadfe2130bb49765a18fc6eee72d50a7
SHA25696afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148
SHA512d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3
-
Filesize
192KB
MD55bd9ca4345bc255f7c96834cf8fd6b33
SHA11ac7ce55fadfe2130bb49765a18fc6eee72d50a7
SHA25696afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148
SHA512d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3
-
Filesize
192KB
MD55bd9ca4345bc255f7c96834cf8fd6b33
SHA11ac7ce55fadfe2130bb49765a18fc6eee72d50a7
SHA25696afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148
SHA512d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3
-
Filesize
192KB
MD55bd9ca4345bc255f7c96834cf8fd6b33
SHA11ac7ce55fadfe2130bb49765a18fc6eee72d50a7
SHA25696afcd05e374acda925f492ecd042926403efd288a24753286e8571b9914e148
SHA512d58c0439c838c8f34d72ed41bc86197545a8e3a6d286c26eea93e0c20e61759265eac51596d67255e7c811bef79ac76c230bfa3db996ef5c01951fef2a6ec8e3