Analysis
-
max time kernel
191s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe
Resource
win10v2004-20221111-en
General
-
Target
c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe
-
Size
60KB
-
MD5
68c38d9780aaf8fa690ea08ddd8b93e4
-
SHA1
87e9d236ebb5b4a359d090b395f3787da5d4ebd6
-
SHA256
c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848
-
SHA512
5abfc8152571bf2004467122341a09d2629b749d3c4a60307ea8cb70e1225b082d1d7be39eccdf3206aa20125b7ea6559c3f391513e0872b4df6310ce245fcdc
-
SSDEEP
768:oXbx1BM3YaWSk1egNvlP2D2n/z/D0lbdfs3OfKDHGqHg6WBzWcQ:oXP9aiUyZ2a/Dxg6WBzWcQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rauoza.exe -
Executes dropped EXE 1 IoCs
pid Process 3556 rauoza.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rauoza.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rauoza = "C:\\Users\\Admin\\rauoza.exe" rauoza.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe 3556 rauoza.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe 3556 rauoza.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3556 3012 c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe 82 PID 3012 wrote to memory of 3556 3012 c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe 82 PID 3012 wrote to memory of 3556 3012 c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe 82 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25 PID 3556 wrote to memory of 3012 3556 rauoza.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe"C:\Users\Admin\AppData\Local\Temp\c29007e2df838dca6e5b075394baa892245d4bb40cac43790973b47a344c4848.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\rauoza.exe"C:\Users\Admin\rauoza.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD535fcf420892a36bc596d44863259936e
SHA1803ea65efb823f699e10dcaa32fd58f765ac9ed0
SHA256b1acb1d6dc46850872078ce18e962dbf37df86b49193ab5ffa537b4be7f0203d
SHA512758b39d7eb0e9ef93891b580e37b509eac411f543842ccaaef399ebcb661ddaacfd28004abc90eadb914de1da14be0f5fb5c195e9a44d4e63a7371f5c02cb965
-
Filesize
60KB
MD535fcf420892a36bc596d44863259936e
SHA1803ea65efb823f699e10dcaa32fd58f765ac9ed0
SHA256b1acb1d6dc46850872078ce18e962dbf37df86b49193ab5ffa537b4be7f0203d
SHA512758b39d7eb0e9ef93891b580e37b509eac411f543842ccaaef399ebcb661ddaacfd28004abc90eadb914de1da14be0f5fb5c195e9a44d4e63a7371f5c02cb965