Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe
Resource
win10v2004-20220812-en
General
-
Target
ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe
-
Size
7.0MB
-
MD5
0d2eef7d69d963589de6151a4584cdea
-
SHA1
ea2c75a9930eee2f47a614a846de2af7141f8579
-
SHA256
ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9
-
SHA512
22c430b407c228271563b560ef2cd93e6bb7cc72a2d26e97280837fbf16ecdcc6f38676ccc422c75a07a6cdd59c3255819b367a769590bc12894fed66e49a62c
-
SSDEEP
3072:DpJvGFgyqTRlU3NhCBvu9pjZEwDxdr8Jrts:9J7Rl+NhwWrjuwDQ4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duutau.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 duutau.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /c" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /r" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /B" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /D" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /p" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /E" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /g" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /W" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /t" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /n" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /i" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /d" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /w" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /s" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /Z" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /l" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /I" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /H" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /f" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /L" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /C" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /P" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /J" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /q" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /u" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /A" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /a" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /e" duutau.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /x" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /h" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /Q" duutau.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /o" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /K" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /O" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /N" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /U" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /Y" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /R" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /S" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /z" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /F" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /v" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /j" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /V" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /G" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /X" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /T" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /M" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /b" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /m" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /z" ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /k" duutau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duutau = "C:\\Users\\Admin\\duutau.exe /y" duutau.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4684 ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe 4684 ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe 2200 duutau.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4684 ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe 2200 duutau.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 2200 4684 ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe 78 PID 4684 wrote to memory of 2200 4684 ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe 78 PID 4684 wrote to memory of 2200 4684 ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe"C:\Users\Admin\AppData\Local\Temp\ec7f7779d34449e20b4eb83929325f528d6f325cfe6ab696349346203e0bb3a9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\duutau.exe"C:\Users\Admin\duutau.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD588b456161e9ad6067063e3b31294e627
SHA12f2ec3bd4bbea0f4e7187b5f9f1fa5ce6a248564
SHA2565ddd00215e02261ed1cdea61304119730d7d8d661c4b80513be6ee96b900d202
SHA512e8e73b863cb95f6d3144e18bed79b3843dc828790261d6bba9f192d5899f932f30e41ac30b54ff133f4be729a4981d29be20777f4ab20141f6d195648edd130e
-
Filesize
7.0MB
MD588b456161e9ad6067063e3b31294e627
SHA12f2ec3bd4bbea0f4e7187b5f9f1fa5ce6a248564
SHA2565ddd00215e02261ed1cdea61304119730d7d8d661c4b80513be6ee96b900d202
SHA512e8e73b863cb95f6d3144e18bed79b3843dc828790261d6bba9f192d5899f932f30e41ac30b54ff133f4be729a4981d29be20777f4ab20141f6d195648edd130e