Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe
Resource
win10v2004-20221111-en
General
-
Target
d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe
-
Size
56KB
-
MD5
3cd60c6c72c4f153d466f29ca2b46880
-
SHA1
4cdda327ed6f27252d835fab9b7750e092bb046b
-
SHA256
d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b
-
SHA512
d3cbd6b9cd54a35d133ac62799be4fee831d255e8d5c09acd9a48262225cf2a4eab4fdc978c2df78d527959b6d18829b7e5abd364119479048aeb55e5f335f54
-
SSDEEP
768:1ZHTpPNct8MOG0f0mq/6/Q/9NF0+LEc8af3ts0E9t:11ncjCq2oS+Ljb3ts0E9t
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sauoza.exe -
Executes dropped EXE 1 IoCs
pid Process 384 sauoza.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sauoza.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sauoza = "C:\\Users\\Admin\\sauoza.exe" sauoza.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe 384 sauoza.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe 384 sauoza.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 384 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe 27 PID 1596 wrote to memory of 384 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe 27 PID 1596 wrote to memory of 384 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe 27 PID 1596 wrote to memory of 384 1596 d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe 27 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26 PID 384 wrote to memory of 1596 384 sauoza.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe"C:\Users\Admin\AppData\Local\Temp\d0948f2f6c332500f3571b288a53d83c13e4b078516021e39f9c316ead73da9b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\sauoza.exe"C:\Users\Admin\sauoza.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD54412ef5613ca62420be1f9ad947ca1d2
SHA1751caa4f05715e1fbd2e6d2bc5f37d1c36c576ee
SHA2563b6478ccb0b5c967ebb85a5b1a0de2bf8457a7479893d33958f4f5f79c413604
SHA51298582eb16b032493c334edd944447bfc1fd63a43668a139813254e7c3ef102a54feededd2a34c81a49e600401782ce904e365dcc9811a04dca31284d3b68ca7a
-
Filesize
56KB
MD54412ef5613ca62420be1f9ad947ca1d2
SHA1751caa4f05715e1fbd2e6d2bc5f37d1c36c576ee
SHA2563b6478ccb0b5c967ebb85a5b1a0de2bf8457a7479893d33958f4f5f79c413604
SHA51298582eb16b032493c334edd944447bfc1fd63a43668a139813254e7c3ef102a54feededd2a34c81a49e600401782ce904e365dcc9811a04dca31284d3b68ca7a
-
Filesize
56KB
MD54412ef5613ca62420be1f9ad947ca1d2
SHA1751caa4f05715e1fbd2e6d2bc5f37d1c36c576ee
SHA2563b6478ccb0b5c967ebb85a5b1a0de2bf8457a7479893d33958f4f5f79c413604
SHA51298582eb16b032493c334edd944447bfc1fd63a43668a139813254e7c3ef102a54feededd2a34c81a49e600401782ce904e365dcc9811a04dca31284d3b68ca7a
-
Filesize
56KB
MD54412ef5613ca62420be1f9ad947ca1d2
SHA1751caa4f05715e1fbd2e6d2bc5f37d1c36c576ee
SHA2563b6478ccb0b5c967ebb85a5b1a0de2bf8457a7479893d33958f4f5f79c413604
SHA51298582eb16b032493c334edd944447bfc1fd63a43668a139813254e7c3ef102a54feededd2a34c81a49e600401782ce904e365dcc9811a04dca31284d3b68ca7a