Analysis
-
max time kernel
151s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe
Resource
win10v2004-20220812-en
General
-
Target
a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe
-
Size
124KB
-
MD5
83ffbe9067e7699ae598508c11b4ed40
-
SHA1
505451e8c266e6b5c60f979e2986ecbb6a457e84
-
SHA256
a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59
-
SHA512
c049619dfdfd32518a949d8df383a480ad21f0f14fcca0a41dd4d69fd2a7e6228ca3c04b5365e53a5d3a7edc6f93bd11617a1ecbb5550204cbd7718a4ff9778f
-
SSDEEP
1536:ydEHhwRguBxeDtMYHa27J14ltxporZ45i8NeG0h/l:+EHhwRgkeV6gJ1uCt45yt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tkdouz.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 tkdouz.exe -
Loads dropped DLL 2 IoCs
pid Process 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /I" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /t" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /M" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /x" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /V" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /S" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /r" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /K" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /U" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /N" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /E" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /k" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /i" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /Q" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /G" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /A" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /a" tkdouz.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /q" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /J" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /n" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /c" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /T" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /z" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /s" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /b" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /P" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /o" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /d" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /X" a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /h" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /e" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /j" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /l" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /O" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /W" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /X" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /R" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /F" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /v" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /y" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /g" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /p" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /B" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /m" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /Z" tkdouz.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /u" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /w" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /Y" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /L" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /C" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /H" tkdouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tkdouz = "C:\\Users\\Admin\\tkdouz.exe /D" tkdouz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe 1724 tkdouz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 1724 tkdouz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1724 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 27 PID 1168 wrote to memory of 1724 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 27 PID 1168 wrote to memory of 1724 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 27 PID 1168 wrote to memory of 1724 1168 a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe"C:\Users\Admin\AppData\Local\Temp\a07770319f34ad78cc64e085ecdc8434b730eba30d61efc630e6ffeadcd65b59.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\tkdouz.exe"C:\Users\Admin\tkdouz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5cea488f5710beac7ccbfc5faa2e8582c
SHA147f61df77993eb2d939bb360f68b70b1f4f6dbea
SHA256efb6826d03912a92ad89d0fece133c46a81621050b54152b550238421f3b6c70
SHA5129c414bdb83d95a0f5c92b1b8a0181ccdfac2113802e96fffd32fcadff0e48d8c6b0829366dbdfbe97f1bcd15c4f50cd03065a5ded3b1b1843ad484db55f44ddc
-
Filesize
124KB
MD5cea488f5710beac7ccbfc5faa2e8582c
SHA147f61df77993eb2d939bb360f68b70b1f4f6dbea
SHA256efb6826d03912a92ad89d0fece133c46a81621050b54152b550238421f3b6c70
SHA5129c414bdb83d95a0f5c92b1b8a0181ccdfac2113802e96fffd32fcadff0e48d8c6b0829366dbdfbe97f1bcd15c4f50cd03065a5ded3b1b1843ad484db55f44ddc
-
Filesize
124KB
MD5cea488f5710beac7ccbfc5faa2e8582c
SHA147f61df77993eb2d939bb360f68b70b1f4f6dbea
SHA256efb6826d03912a92ad89d0fece133c46a81621050b54152b550238421f3b6c70
SHA5129c414bdb83d95a0f5c92b1b8a0181ccdfac2113802e96fffd32fcadff0e48d8c6b0829366dbdfbe97f1bcd15c4f50cd03065a5ded3b1b1843ad484db55f44ddc
-
Filesize
124KB
MD5cea488f5710beac7ccbfc5faa2e8582c
SHA147f61df77993eb2d939bb360f68b70b1f4f6dbea
SHA256efb6826d03912a92ad89d0fece133c46a81621050b54152b550238421f3b6c70
SHA5129c414bdb83d95a0f5c92b1b8a0181ccdfac2113802e96fffd32fcadff0e48d8c6b0829366dbdfbe97f1bcd15c4f50cd03065a5ded3b1b1843ad484db55f44ddc