Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe
Resource
win10v2004-20221111-en
General
-
Target
b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe
-
Size
156KB
-
MD5
b59968561ec05662401990d60caf94d9
-
SHA1
ebe6873ff34676e296ab263dabae3f3fd6a12847
-
SHA256
b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb
-
SHA512
8a50c2e8e2af41a9d8633868e06a2b9576cb38afc8101bedfd105ceab807b08efeee34103dfeff44c53e81f3210642da6a807d4855716948f99189904f637d6f
-
SSDEEP
1536:trkumduYPBU8gRDGHPOGMmUbaxGAka+t/K9rCGaV9mw7Jqx8M+dzAbOQgRVd:kduY5a4UbaxqkCGaVD7JqfKAbfod
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rwyun.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 rwyun.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /D" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /g" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /f" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /u" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /A" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /K" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /Z" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /F" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /C" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /B" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /R" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /x" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /r" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /i" rwyun.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /W" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /w" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /J" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /c" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /b" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /I" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /d" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /e" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /k" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /Y" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /H" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /Z" b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /v" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /z" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /s" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /L" rwyun.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /q" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /X" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /t" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /T" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /n" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /a" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /p" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /l" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /P" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /E" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /G" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /j" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /N" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /U" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /y" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /Q" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /h" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /m" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /V" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /o" rwyun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rwyun = "C:\\Users\\Admin\\rwyun.exe /S" rwyun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe 1948 rwyun.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 1948 rwyun.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1948 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 26 PID 1612 wrote to memory of 1948 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 26 PID 1612 wrote to memory of 1948 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 26 PID 1612 wrote to memory of 1948 1612 b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe"C:\Users\Admin\AppData\Local\Temp\b096475574f47a431d496f4f4c154f2484baed1e2bcbc4c0a07e3a75c7022adb.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\rwyun.exe"C:\Users\Admin\rwyun.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD589ee531b802e017f5784d9f1699b6436
SHA168546702264df0a5c9e232b4b6b3c33f8a4e5541
SHA2565c9ee6a7ba8b4af58c80d08e2df607f90763655208b3f8081773b801a551adc9
SHA512816c30cce3d2d3d03390fc51541b697f6dfeef3d04e8d69a32568317a3dc1fd9309b36b48d3c300ed46dc6c121e6937749b828d2cc42d3625342e5d02a9d48fd
-
Filesize
156KB
MD589ee531b802e017f5784d9f1699b6436
SHA168546702264df0a5c9e232b4b6b3c33f8a4e5541
SHA2565c9ee6a7ba8b4af58c80d08e2df607f90763655208b3f8081773b801a551adc9
SHA512816c30cce3d2d3d03390fc51541b697f6dfeef3d04e8d69a32568317a3dc1fd9309b36b48d3c300ed46dc6c121e6937749b828d2cc42d3625342e5d02a9d48fd
-
Filesize
156KB
MD589ee531b802e017f5784d9f1699b6436
SHA168546702264df0a5c9e232b4b6b3c33f8a4e5541
SHA2565c9ee6a7ba8b4af58c80d08e2df607f90763655208b3f8081773b801a551adc9
SHA512816c30cce3d2d3d03390fc51541b697f6dfeef3d04e8d69a32568317a3dc1fd9309b36b48d3c300ed46dc6c121e6937749b828d2cc42d3625342e5d02a9d48fd
-
Filesize
156KB
MD589ee531b802e017f5784d9f1699b6436
SHA168546702264df0a5c9e232b4b6b3c33f8a4e5541
SHA2565c9ee6a7ba8b4af58c80d08e2df607f90763655208b3f8081773b801a551adc9
SHA512816c30cce3d2d3d03390fc51541b697f6dfeef3d04e8d69a32568317a3dc1fd9309b36b48d3c300ed46dc6c121e6937749b828d2cc42d3625342e5d02a9d48fd