Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe
Resource
win10v2004-20220901-en
General
-
Target
0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe
-
Size
336KB
-
MD5
28ab4a04585ca7048a9a72b3516dc940
-
SHA1
c42bcac6be4ccd0a32ca31c379c0ea737e7a8e42
-
SHA256
0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937
-
SHA512
d33655794265f2d4fcee2384326e9ee8265ae75370a700d0a4c23b502e2aa6631bde28071746907beb162006bfd3e5c4725b8200b314b6fd502c1283ed7b9143
-
SSDEEP
6144:RygkzSzm0+RltuYb4NEzrVCU8TCOqHaC6Y6EX+mnqcXZWgbp1GO:PISzmfRltF4NEzrVCU8Tzq6C6Y6EX+mD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nonub.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 nonub.exe -
Loads dropped DLL 2 IoCs
pid Process 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /u" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /s" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /w" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /g" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /x" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /q" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /u" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /n" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /h" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /s" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /b" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /g" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /t" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /j" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /i" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /e" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /n" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /r" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /z" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /e" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /a" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /t" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /r" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /k" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /a" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /p" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /c" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /j" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /m" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /y" 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /x" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /h" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /d" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /i" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /m" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /v" nonub.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /k" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /l" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /w" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /v" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /d" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /f" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /o" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /c" nonub.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /y" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /y" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /l" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /f" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /b" nonub.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /q" nonub.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /q" 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /p" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /z" nonub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nonub = "C:\\Users\\Admin\\nonub.exe /o" nonub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe 1960 nonub.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 1960 nonub.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1960 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 27 PID 1064 wrote to memory of 1960 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 27 PID 1064 wrote to memory of 1960 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 27 PID 1064 wrote to memory of 1960 1064 0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe"C:\Users\Admin\AppData\Local\Temp\0d19c867a54f64dc0e3a8fcacd2da487db0e40caf26fcded2e2c68dfcd3a5937.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\nonub.exe"C:\Users\Admin\nonub.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5661cc1e6a6191cace0ab99ea34280784
SHA1fd73f965afacae1a3bfaf4eea9ff547d6ed4c6a7
SHA256d08a9b981eead5db8e2f4443606c3380d8d915495036dd4869437fc72d686e52
SHA512d3f04a0328a1cda089c9e79af3b6af51678abd92ec496b0a51397179a0aa6256d3ed5e50681bd0bd9259aa35aef789d0468856058d2fa159d64d148833fb5f3a
-
Filesize
336KB
MD5661cc1e6a6191cace0ab99ea34280784
SHA1fd73f965afacae1a3bfaf4eea9ff547d6ed4c6a7
SHA256d08a9b981eead5db8e2f4443606c3380d8d915495036dd4869437fc72d686e52
SHA512d3f04a0328a1cda089c9e79af3b6af51678abd92ec496b0a51397179a0aa6256d3ed5e50681bd0bd9259aa35aef789d0468856058d2fa159d64d148833fb5f3a
-
Filesize
336KB
MD5661cc1e6a6191cace0ab99ea34280784
SHA1fd73f965afacae1a3bfaf4eea9ff547d6ed4c6a7
SHA256d08a9b981eead5db8e2f4443606c3380d8d915495036dd4869437fc72d686e52
SHA512d3f04a0328a1cda089c9e79af3b6af51678abd92ec496b0a51397179a0aa6256d3ed5e50681bd0bd9259aa35aef789d0468856058d2fa159d64d148833fb5f3a
-
Filesize
336KB
MD5661cc1e6a6191cace0ab99ea34280784
SHA1fd73f965afacae1a3bfaf4eea9ff547d6ed4c6a7
SHA256d08a9b981eead5db8e2f4443606c3380d8d915495036dd4869437fc72d686e52
SHA512d3f04a0328a1cda089c9e79af3b6af51678abd92ec496b0a51397179a0aa6256d3ed5e50681bd0bd9259aa35aef789d0468856058d2fa159d64d148833fb5f3a