Analysis
-
max time kernel
240s -
max time network
258s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe
Resource
win10v2004-20221111-en
General
-
Target
48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe
-
Size
380KB
-
MD5
0733e10521fc5b641115e0f308555190
-
SHA1
8181beb3f7eb8f27922571e4f4ad73fac96d0598
-
SHA256
48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd
-
SHA512
bbf38b626dee21ab56c1b95e4a25e4daa8e63ec606672af352d2d0a2b5534def3c500a129ec81ab7f0421e09238f5c5f474928ec6addbd26bef5c2b877232007
-
SSDEEP
6144:ghEu0K1Zc/jWhvd0yTNxjT0M1zWyjYd9Z:SE3KQeV0C30IzW7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fauqua.exe -
Executes dropped EXE 1 IoCs
pid Process 4424 fauqua.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /t" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /f" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /d" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /c" fauqua.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /o" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /g" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /s" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /h" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /n" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /a" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /b" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /r" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /p" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /q" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /q" 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /y" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /k" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /l" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /w" fauqua.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /i" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /j" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /z" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /e" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /m" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /x" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /u" fauqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fauqua = "C:\\Users\\Admin\\fauqua.exe /v" fauqua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe 2696 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe 4424 fauqua.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2696 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe 4424 fauqua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4424 2696 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe 81 PID 2696 wrote to memory of 4424 2696 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe 81 PID 2696 wrote to memory of 4424 2696 48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe"C:\Users\Admin\AppData\Local\Temp\48476feb022aeb04eda9ad2c6b8b525e1b110c47b8da95781f89340d785dc8cd.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\fauqua.exe"C:\Users\Admin\fauqua.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5dddb5033abe0dc096b5e50f01c2bcbcd
SHA119136571d07277b194d64d36b624ebd1ccb1e3ac
SHA256c9ded152b04f841750d08cccd9051c66ce1304075da05654495919673cd0b485
SHA5124739c58bb19e8d722a18761fe3399370867d6045434d15bd1514ab1768d27721d2266ce66cac506a3930e9a821243544fffeea7681d77b04c12d8058e90df562
-
Filesize
380KB
MD5dddb5033abe0dc096b5e50f01c2bcbcd
SHA119136571d07277b194d64d36b624ebd1ccb1e3ac
SHA256c9ded152b04f841750d08cccd9051c66ce1304075da05654495919673cd0b485
SHA5124739c58bb19e8d722a18761fe3399370867d6045434d15bd1514ab1768d27721d2266ce66cac506a3930e9a821243544fffeea7681d77b04c12d8058e90df562