Analysis
-
max time kernel
156s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe
Resource
win10v2004-20221111-en
General
-
Target
94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe
-
Size
288KB
-
MD5
6b3f29b89de28fd5c6cc658a218fd85e
-
SHA1
81f0c0bba44b7af0b089a193199b8f339358d4e4
-
SHA256
94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca
-
SHA512
20307e349a1af9516e010c546c4174e87b6ad48647e11aa510d23390593d19b94be2549c96e60ffad76cdc790490ad58a59b21dd209fd376aaa5d41ad4fa83ee
-
SSDEEP
6144:QAyfc0f7XP+g3AGJpWVzue2oMKnvmb7/D26jiuX1N38RAFrjgWtokZkuL6O96/Yl:Qo27/XvLWpue2oMKnvmb7/D26j138RAh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foufo.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 foufo.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /U" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /w" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /O" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /r" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /s" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /Z" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /t" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /q" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /A" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /V" foufo.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /D" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /y" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /H" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /g" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /p" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /B" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /T" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /o" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /a" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /C" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /x" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /u" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /S" 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /d" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /b" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /P" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /z" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /L" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /c" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /M" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /h" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /j" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /J" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /v" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /F" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /G" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /e" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /W" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /n" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /Y" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /S" foufo.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /X" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /i" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /E" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /f" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /K" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /I" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /k" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /R" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /N" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /l" foufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\foufo = "C:\\Users\\Admin\\foufo.exe /m" foufo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe 2008 foufo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 2008 foufo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2008 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 28 PID 1280 wrote to memory of 2008 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 28 PID 1280 wrote to memory of 2008 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 28 PID 1280 wrote to memory of 2008 1280 94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe"C:\Users\Admin\AppData\Local\Temp\94d809f4e77a6d34a703a3173a93b5743986a466dfd5a4d3bc6f29c519bd0bca.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\foufo.exe"C:\Users\Admin\foufo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD57288e25d688e24ef67605adce2774ec5
SHA18e39278fb84398ef59787e3d5460cbc75d832486
SHA256c8d901cc87d41a9eaeaaf95e3c62af17ccbd95b77d7dd8ca376fc91dc4e1ffb5
SHA512d674b403982c482010310cc0b06b292a8d786d9e9afdeb887c41ff546d42d5c0ab19e01a78f7357803472bc372e1b8e80881a12df3a71c0723a6386c1073d8c6
-
Filesize
288KB
MD57288e25d688e24ef67605adce2774ec5
SHA18e39278fb84398ef59787e3d5460cbc75d832486
SHA256c8d901cc87d41a9eaeaaf95e3c62af17ccbd95b77d7dd8ca376fc91dc4e1ffb5
SHA512d674b403982c482010310cc0b06b292a8d786d9e9afdeb887c41ff546d42d5c0ab19e01a78f7357803472bc372e1b8e80881a12df3a71c0723a6386c1073d8c6
-
Filesize
288KB
MD57288e25d688e24ef67605adce2774ec5
SHA18e39278fb84398ef59787e3d5460cbc75d832486
SHA256c8d901cc87d41a9eaeaaf95e3c62af17ccbd95b77d7dd8ca376fc91dc4e1ffb5
SHA512d674b403982c482010310cc0b06b292a8d786d9e9afdeb887c41ff546d42d5c0ab19e01a78f7357803472bc372e1b8e80881a12df3a71c0723a6386c1073d8c6
-
Filesize
288KB
MD57288e25d688e24ef67605adce2774ec5
SHA18e39278fb84398ef59787e3d5460cbc75d832486
SHA256c8d901cc87d41a9eaeaaf95e3c62af17ccbd95b77d7dd8ca376fc91dc4e1ffb5
SHA512d674b403982c482010310cc0b06b292a8d786d9e9afdeb887c41ff546d42d5c0ab19e01a78f7357803472bc372e1b8e80881a12df3a71c0723a6386c1073d8c6