Analysis
-
max time kernel
154s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe
Resource
win10v2004-20220812-en
General
-
Target
e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe
-
Size
348KB
-
MD5
38a10e3ed3bd3e13c6dea59f3e7dbeac
-
SHA1
98a84961f64b45fcaa4d7b5cb9e48498cb77fa85
-
SHA256
e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e
-
SHA512
ef13c20d10bcec81d20512cd7d5e74ef13c9f78c46d8cb52da535aa7c9c43f959d5f7011c9ade5cc89f5bd706fb5a1e5b57a42b727eee37155ec3954a19b781f
-
SSDEEP
3072:rYwVdKONISknKKZH8dC7YJwZqIXrDEc87jsMuQWkJUvFpiRRS8R3y5oZ7W1XQeF4:rfkh4dyDu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puozax.exe -
Executes dropped EXE 1 IoCs
pid Process 5080 puozax.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /o" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /S" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /d" puozax.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /c" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /H" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /V" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /e" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /q" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /O" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /Q" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /F" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /w" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /b" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /u" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /h" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /D" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /M" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /Z" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /I" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /A" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /s" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /E" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /N" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /t" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /p" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /f" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /P" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /C" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /U" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /W" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /v" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /g" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /n" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /x" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /i" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /T" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /z" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /Y" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /r" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /B" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /J" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /G" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /j" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /k" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /y" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /X" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /a" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /m" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /l" puozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puozax = "C:\\Users\\Admin\\puozax.exe /L" puozax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe 5080 puozax.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe 5080 puozax.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 5080 1988 e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe 81 PID 1988 wrote to memory of 5080 1988 e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe 81 PID 1988 wrote to memory of 5080 1988 e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe 81 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78 PID 5080 wrote to memory of 1988 5080 puozax.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe"C:\Users\Admin\AppData\Local\Temp\e9157b50cd83e0380f9be33a82401d144bee34f9204c21b6e60f92579f3ca24e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\puozax.exe"C:\Users\Admin\puozax.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD57c3b8341779b75389777dfb18eba54e6
SHA1f32797a84bed0f5ed9f8e6d432be44962727a655
SHA256b2c809d790fc8f792adeb8d8b6da0e7b55be52799dc397a65035e4e5a6c49e8b
SHA51289156cff7fcc857e32271dfdd86d6e9a612d0258e7579e0b72e39897fefb9f651a2d62f52c440fdb4277e6e90df17a4bd2fc4d6ec9e6e94c71445c891b3aa375
-
Filesize
348KB
MD57c3b8341779b75389777dfb18eba54e6
SHA1f32797a84bed0f5ed9f8e6d432be44962727a655
SHA256b2c809d790fc8f792adeb8d8b6da0e7b55be52799dc397a65035e4e5a6c49e8b
SHA51289156cff7fcc857e32271dfdd86d6e9a612d0258e7579e0b72e39897fefb9f651a2d62f52c440fdb4277e6e90df17a4bd2fc4d6ec9e6e94c71445c891b3aa375