Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 19:24
Static task
static1
Behavioral task
behavioral1
Sample
7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe
Resource
win10v2004-20220812-en
General
-
Target
7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe
-
Size
140KB
-
MD5
060999cc41b27fff07ec01d002ad5de0
-
SHA1
1435237348d286d474f7aa569632db44d53c07dc
-
SHA256
7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612
-
SHA512
05b11e35a2548d9629dc35ed36776520869e4a99e1fd801d72d77abc10b693c9f9ba8f815c2a96142b235a2dee8038512796e01c073bf60dd634a9576106c67e
-
SSDEEP
1536:xu0go4oNyLV4Ji2+6wl4fAsyCsJ2AyJOSfNifNuzyWh4oQ/hKeXsjEFInm:biCi2+6CXfCZAyJH1i1uz34oQZiEYm
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tauufid.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 tauufid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /P" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /a" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /X" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /u" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /w" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /z" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /x" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /f" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /s" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /K" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /b" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /Y" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /E" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /C" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /d" 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /V" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /e" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /h" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /I" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /c" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /W" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /N" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /Q" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /F" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /S" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /J" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /A" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /o" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /d" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /T" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /j" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /p" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /M" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /t" tauufid.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /g" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /m" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /B" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /G" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /n" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /U" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /L" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /r" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /l" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /k" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /R" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /Z" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /q" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /H" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /v" tauufid.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /y" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /D" tauufid.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tauufid = "C:\\Users\\Admin\\tauufid.exe /O" tauufid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4584 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe 4584 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe 4596 tauufid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4584 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe 4596 tauufid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4596 4584 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe 78 PID 4584 wrote to memory of 4596 4584 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe 78 PID 4584 wrote to memory of 4596 4584 7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe"C:\Users\Admin\AppData\Local\Temp\7437e7e99f1a7084556f8b21078d85dc66c09c363260a6b53f3d13b63228d612.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\tauufid.exe"C:\Users\Admin\tauufid.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5ae1e040c9f6ea9358e919df652febc2d
SHA1c9aeae3a4ed2da1e8a51e8aeb779eb1097dbadf3
SHA2565bc850cbe9696598e546306f7f35aff9a814c508930f2c36dbd60aff717e61b9
SHA5127fbf21a8de5bf22aea8eca25bfc92b5e9e4184e7cb5df41627009adf030198c4bb7a13cf8fae4006408b06aa44c6c681335bc2614a24f5b1e5177c936ddddbee
-
Filesize
140KB
MD5ae1e040c9f6ea9358e919df652febc2d
SHA1c9aeae3a4ed2da1e8a51e8aeb779eb1097dbadf3
SHA2565bc850cbe9696598e546306f7f35aff9a814c508930f2c36dbd60aff717e61b9
SHA5127fbf21a8de5bf22aea8eca25bfc92b5e9e4184e7cb5df41627009adf030198c4bb7a13cf8fae4006408b06aa44c6c681335bc2614a24f5b1e5177c936ddddbee