Analysis
-
max time kernel
150s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe
Resource
win10v2004-20220812-en
General
-
Target
eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe
-
Size
304KB
-
MD5
1bddeda269cb7cb5b41b6e497757ded0
-
SHA1
12841ce1bcaadb6a7786a07ee54ba9c328512d9f
-
SHA256
eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e
-
SHA512
5b1718b0e93edad8c7ee201b53331dc75819bf24f7982c935d3aa17923338dee29e13a51b49fd15f5d57b1af5ad52245a303b2514382126488434846a4ca6742
-
SSDEEP
3072:GPGOaEaAaTG0kZSmA2Spxqc+2IMop2aEaLFra+7pvPSvzhy:b4ApDJIylaRSg
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tueed.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 tueed.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /f" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /y" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /z" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /x" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /t" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /r" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /m" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /a" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /n" tueed.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /o" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /h" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /j" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /b" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /l" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /g" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /u" eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /u" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /w" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /v" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /d" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /q" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /p" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /s" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /c" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /k" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /e" tueed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueed = "C:\\Users\\Admin\\tueed.exe /i" tueed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe 1232 tueed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 1232 tueed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1232 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 28 PID 1968 wrote to memory of 1232 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 28 PID 1968 wrote to memory of 1232 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 28 PID 1968 wrote to memory of 1232 1968 eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe"C:\Users\Admin\AppData\Local\Temp\eaae24c6324e8d7f39f38ecceb39970a92b98e22f46ca851bc81e7b0c108579e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\tueed.exe"C:\Users\Admin\tueed.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5a2bf2242ab46e58b0e85efd37a732ab6
SHA1f3f548634866c7ebc356b644336a9e4018e7a84e
SHA256be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313
SHA512d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f
-
Filesize
304KB
MD5a2bf2242ab46e58b0e85efd37a732ab6
SHA1f3f548634866c7ebc356b644336a9e4018e7a84e
SHA256be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313
SHA512d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f
-
Filesize
304KB
MD5a2bf2242ab46e58b0e85efd37a732ab6
SHA1f3f548634866c7ebc356b644336a9e4018e7a84e
SHA256be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313
SHA512d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f
-
Filesize
304KB
MD5a2bf2242ab46e58b0e85efd37a732ab6
SHA1f3f548634866c7ebc356b644336a9e4018e7a84e
SHA256be0a58b089f55f13ad631fc42be1fd364c8998dc39f5d08a0a45bd9155efc313
SHA512d768d26ecec66c2b6bc0df6d0d4e1fb2d88b076519e74f12360fe7d7b637bd6f94f77523cc1a6695f3e7c482e7c51188ebae2fbf5d5e54987c50ba0f562ba90f