Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe
Resource
win10v2004-20220812-en
General
-
Target
ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe
-
Size
285KB
-
MD5
8728609e88f9f8a582247665a859fa75
-
SHA1
8bbc0fdd9db4c8df1aab5cf21b9f8623f22c871d
-
SHA256
ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14
-
SHA512
383df18d17cc211852afa35fd087ddd301538295aed2a2006e9a1cae12c7139f289103ffb9cf45542bff1789ed414055e9cd354a8097e902e98f859ee8daea6a
-
SSDEEP
6144:CZuuObR8sVImcyYIK2JogutPT50T4wmUBSLe3et1d8D/K/Xy7KU:BV+mz6rPN0TrbSLXt1SD/K/XyOU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,c:\\windows\\system32\\RSTray.exe" huli.exe -
Executes dropped EXE 3 IoCs
pid Process 940 huli.exe 1660 360setup.exe 308 cj2.exe -
Loads dropped DLL 8 IoCs
pid Process 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 940 huli.exe 1660 360setup.exe 1660 360setup.exe 1660 360setup.exe 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RSTray.exe huli.exe File opened for modification C:\Windows\SysWOW64\360setup.exe huli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 940 huli.exe 1660 360setup.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1604 wrote to memory of 940 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 27 PID 1604 wrote to memory of 940 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 27 PID 1604 wrote to memory of 940 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 27 PID 1604 wrote to memory of 940 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 27 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 1660 940 huli.exe 28 PID 940 wrote to memory of 680 940 huli.exe 29 PID 940 wrote to memory of 680 940 huli.exe 29 PID 940 wrote to memory of 680 940 huli.exe 29 PID 940 wrote to memory of 680 940 huli.exe 29 PID 1604 wrote to memory of 308 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 31 PID 1604 wrote to memory of 308 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 31 PID 1604 wrote to memory of 308 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 31 PID 1604 wrote to memory of 308 1604 ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe"C:\Users\Admin\AppData\Local\Temp\ae653bf178849524d00e8598296ca7f109e96551a93fcf05e97310b431137d14.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\huli.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\huli.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\360setup.exe"C:\Windows\system32\360setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templateskill.bat""3⤵PID:680
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cj2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cj2.exe"2⤵
- Executes dropped EXE
PID:308
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD559df9a5bee8f0efb4d8fa4ef533a75f5
SHA1425d13da70388767e1a88bea567729f239c312d0
SHA256a83c1a332b1b8e5784b0d7f39e3077fd9c7d681ac6055a9a066b1e44cd993b89
SHA512f014b9679d26af9d069fbae77535898314339595aebec0553c97487aadaccdec5c5b7985fe0da5ba6a4abaaf47af8c694fd1806062a8e2ec27cf2411cadce892
-
Filesize
232KB
MD5a2ce852533ddb97a40c2a85ea09c648f
SHA13ce2a8304ebbf4009d364c9c18459452e6235eb9
SHA256513973afd3a587d82672ca0fe96931d56e52f3b101966c7c3467508708ec4312
SHA5124961ef8abff181383b833358c643c330ec362077e0a02b89850cc1120731c0097c7796e13252131a5172c8468793e0d3748e660215140ca9d47d9a3e7ea311f9
-
Filesize
232KB
MD5a2ce852533ddb97a40c2a85ea09c648f
SHA13ce2a8304ebbf4009d364c9c18459452e6235eb9
SHA256513973afd3a587d82672ca0fe96931d56e52f3b101966c7c3467508708ec4312
SHA5124961ef8abff181383b833358c643c330ec362077e0a02b89850cc1120731c0097c7796e13252131a5172c8468793e0d3748e660215140ca9d47d9a3e7ea311f9
-
Filesize
150B
MD5ed85a3d9b6c240890a471e563ad51d8d
SHA1390ffe91c255164c1b7544c2464850df96e7c23e
SHA2566dfed0f5a52f87082a0005f68790ecc11f36242614726313b5ca4cba6afea18a
SHA51222d10dab34ded654c5650e78a454905f7cdee0b0d122c17c443062087db4dc397a8430ffed2b3c4d77108e9c1b1dc09eb410c605939de0d600c0dcb9caeffc1e
-
Filesize
72KB
MD593b49744b7ce7c0f75ac8cd2d78a8aa2
SHA15b22eeedfd00e898a32ecf84620c06447b9ad6bc
SHA256fb514660e066521b078961daec192338f6e98573c679b37a17596da891ac876d
SHA512e71c4af707a09bd33b4031fb643142f3d6d21ca1536f3bc59d9b4a114baec10a2678362a25a80ec9bbd1accb5491be3d36763dd756b2e1bbd1cf045692326273
-
Filesize
80KB
MD5e11bced11196fd7a8c914ab8da81c16e
SHA150f67e14dd7646de76c088eb6f58307c7f14dad5
SHA25628ce96206970b988603001a6aac71df3cc5a67cc5ccd31840b9839810ca5cc08
SHA51217bc8ac4b9699fa46ec7ae2ea4bba843018bf675df3ea5427a333ea06bb440e9669c4cc5f5eefe5d43702c3375e04fcb439db3fd4695b699a467671e05a639a3
-
Filesize
80KB
MD5e11bced11196fd7a8c914ab8da81c16e
SHA150f67e14dd7646de76c088eb6f58307c7f14dad5
SHA25628ce96206970b988603001a6aac71df3cc5a67cc5ccd31840b9839810ca5cc08
SHA51217bc8ac4b9699fa46ec7ae2ea4bba843018bf675df3ea5427a333ea06bb440e9669c4cc5f5eefe5d43702c3375e04fcb439db3fd4695b699a467671e05a639a3
-
Filesize
10KB
MD559df9a5bee8f0efb4d8fa4ef533a75f5
SHA1425d13da70388767e1a88bea567729f239c312d0
SHA256a83c1a332b1b8e5784b0d7f39e3077fd9c7d681ac6055a9a066b1e44cd993b89
SHA512f014b9679d26af9d069fbae77535898314339595aebec0553c97487aadaccdec5c5b7985fe0da5ba6a4abaaf47af8c694fd1806062a8e2ec27cf2411cadce892
-
Filesize
10KB
MD559df9a5bee8f0efb4d8fa4ef533a75f5
SHA1425d13da70388767e1a88bea567729f239c312d0
SHA256a83c1a332b1b8e5784b0d7f39e3077fd9c7d681ac6055a9a066b1e44cd993b89
SHA512f014b9679d26af9d069fbae77535898314339595aebec0553c97487aadaccdec5c5b7985fe0da5ba6a4abaaf47af8c694fd1806062a8e2ec27cf2411cadce892
-
Filesize
232KB
MD5a2ce852533ddb97a40c2a85ea09c648f
SHA13ce2a8304ebbf4009d364c9c18459452e6235eb9
SHA256513973afd3a587d82672ca0fe96931d56e52f3b101966c7c3467508708ec4312
SHA5124961ef8abff181383b833358c643c330ec362077e0a02b89850cc1120731c0097c7796e13252131a5172c8468793e0d3748e660215140ca9d47d9a3e7ea311f9
-
Filesize
232KB
MD5a2ce852533ddb97a40c2a85ea09c648f
SHA13ce2a8304ebbf4009d364c9c18459452e6235eb9
SHA256513973afd3a587d82672ca0fe96931d56e52f3b101966c7c3467508708ec4312
SHA5124961ef8abff181383b833358c643c330ec362077e0a02b89850cc1120731c0097c7796e13252131a5172c8468793e0d3748e660215140ca9d47d9a3e7ea311f9
-
Filesize
80KB
MD5e11bced11196fd7a8c914ab8da81c16e
SHA150f67e14dd7646de76c088eb6f58307c7f14dad5
SHA25628ce96206970b988603001a6aac71df3cc5a67cc5ccd31840b9839810ca5cc08
SHA51217bc8ac4b9699fa46ec7ae2ea4bba843018bf675df3ea5427a333ea06bb440e9669c4cc5f5eefe5d43702c3375e04fcb439db3fd4695b699a467671e05a639a3
-
Filesize
80KB
MD5e11bced11196fd7a8c914ab8da81c16e
SHA150f67e14dd7646de76c088eb6f58307c7f14dad5
SHA25628ce96206970b988603001a6aac71df3cc5a67cc5ccd31840b9839810ca5cc08
SHA51217bc8ac4b9699fa46ec7ae2ea4bba843018bf675df3ea5427a333ea06bb440e9669c4cc5f5eefe5d43702c3375e04fcb439db3fd4695b699a467671e05a639a3
-
Filesize
80KB
MD5e11bced11196fd7a8c914ab8da81c16e
SHA150f67e14dd7646de76c088eb6f58307c7f14dad5
SHA25628ce96206970b988603001a6aac71df3cc5a67cc5ccd31840b9839810ca5cc08
SHA51217bc8ac4b9699fa46ec7ae2ea4bba843018bf675df3ea5427a333ea06bb440e9669c4cc5f5eefe5d43702c3375e04fcb439db3fd4695b699a467671e05a639a3
-
Filesize
80KB
MD5e11bced11196fd7a8c914ab8da81c16e
SHA150f67e14dd7646de76c088eb6f58307c7f14dad5
SHA25628ce96206970b988603001a6aac71df3cc5a67cc5ccd31840b9839810ca5cc08
SHA51217bc8ac4b9699fa46ec7ae2ea4bba843018bf675df3ea5427a333ea06bb440e9669c4cc5f5eefe5d43702c3375e04fcb439db3fd4695b699a467671e05a639a3