Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
Resource
win10v2004-20220812-en
General
-
Target
f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe
-
Size
132KB
-
MD5
dfa569dbc47c162600a6fe4dffa7b885
-
SHA1
fd51f332ad47274a127530a5a6f3b6926002de94
-
SHA256
f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac
-
SHA512
8f2d50ea3e4fd4cc75b8f7aa880d357e8833d9078d50e8457620f5b677520455a999653c883dc160cc86887a0d4ad8f4c4d296fe47ecf5e40ca196f52f9bc918
-
SSDEEP
3072:VeDgqy7TBJVSgpS5uIyio/Conuh1CNvDbibT:VjqoTB2grko/C2gcniv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juoumo.exe -
Executes dropped EXE 1 IoCs
pid Process 4912 juoumo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /S" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /E" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /L" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /Z" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /X" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /c" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /N" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /a" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /U" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /i" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /q" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /t" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /o" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /W" juoumo.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /h" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /e" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /j" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /O" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /y" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /n" juoumo.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /A" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /f" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /k" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /M" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /b" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /V" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /r" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /B" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /I" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /g" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /C" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /G" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /K" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /P" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /m" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /s" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /u" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /a" f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /w" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /F" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /T" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /Y" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /l" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /z" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /Q" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /J" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /p" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /D" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /v" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /H" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /x" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /d" juoumo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juoumo = "C:\\Users\\Admin\\juoumo.exe /R" juoumo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe 3016 f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe 4912 juoumo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3016 f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe 4912 juoumo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4912 3016 f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe 80 PID 3016 wrote to memory of 4912 3016 f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe 80 PID 3016 wrote to memory of 4912 3016 f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe"C:\Users\Admin\AppData\Local\Temp\f114d800b490408f9db10891904b366bf0675ab7c816d05e85af9088035447ac.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\juoumo.exe"C:\Users\Admin\juoumo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD59e26dc3a7a7cafc81e5e870ca242711c
SHA13e4b6ba964cf7a0b037062584869444b105ee786
SHA256cf10f1a22d670ff4743c24bf8435742a222a41ddd315b17c82381b9daf25ea91
SHA5129c0756014876ddae8d9cfa68324df53ab4c7d779220974c2ea27fe3de879c02f8c3b23dc6456f2bc20ce31ab933dbc0b1c828739485cd94e7666e8502373ebf8
-
Filesize
132KB
MD59e26dc3a7a7cafc81e5e870ca242711c
SHA13e4b6ba964cf7a0b037062584869444b105ee786
SHA256cf10f1a22d670ff4743c24bf8435742a222a41ddd315b17c82381b9daf25ea91
SHA5129c0756014876ddae8d9cfa68324df53ab4c7d779220974c2ea27fe3de879c02f8c3b23dc6456f2bc20ce31ab933dbc0b1c828739485cd94e7666e8502373ebf8