Analysis
-
max time kernel
193s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe
Resource
win10v2004-20221111-en
General
-
Target
cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe
-
Size
260KB
-
MD5
07a32a864ade6d52249facecc15a0131
-
SHA1
46ba25c7fa405f1245889f057040cf899ed033e3
-
SHA256
cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae
-
SHA512
fd07c80ef5011146147b22ad1b7c45060beccffcaf49da0792a8bfce8b4371b8bbaceb827f2bd83b395d26a870aefc430e1dc0ee2bcd260f738cd03d89360973
-
SSDEEP
6144:x4HyUUp7WQn6mr1R4bKLnXejKloO6JU1J7QnpRZ7Ta9kzU2/pn:xk0p6Qn6mr1R4bKLnXaKaO6O1JApvH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teuuruz.exe -
Executes dropped EXE 1 IoCs
pid Process 656 teuuruz.exe -
Loads dropped DLL 2 IoCs
pid Process 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe -
Adds Run key to start application 2 TTPs 45 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /F" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /Q" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /U" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /V" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /g" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /k" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /I" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /u" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /G" teuuruz.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /n" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /B" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /Z" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /W" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /x" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /z" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /D" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /m" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /l" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /i" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /w" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /T" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /b" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /C" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /d" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /f" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /c" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /e" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /P" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /O" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /E" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /L" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /S" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /R" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /t" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /H" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /h" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /s" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /q" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /M" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /o" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /N" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /J" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /K" teuuruz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuuruz = "C:\\Users\\Admin\\teuuruz.exe /A" teuuruz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe 656 teuuruz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe 656 teuuruz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 828 wrote to memory of 656 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe 28 PID 828 wrote to memory of 656 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe 28 PID 828 wrote to memory of 656 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe 28 PID 828 wrote to memory of 656 828 cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe"C:\Users\Admin\AppData\Local\Temp\cde027664c59ea0d89b9aa03cb537a69cb2813b23b4dfa4e228858f0557079ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\teuuruz.exe"C:\Users\Admin\teuuruz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD536aa1e5cad51c47c3c9307e21a762b85
SHA1f472e8f1af0ed471958dcf8d77e530bc977c7ac3
SHA256ea765c93a140ae9a59c4886dfd7136417191a8ac35425f346d015daaa510a34e
SHA51212f23880d7804bccdeaaa5abdb37d63f1656dab8e53bf7637b8ebba317a67edc2f042f79d9a6af8322101dc2462c4788fac9faa788877192153396cced2d56ac
-
Filesize
260KB
MD536aa1e5cad51c47c3c9307e21a762b85
SHA1f472e8f1af0ed471958dcf8d77e530bc977c7ac3
SHA256ea765c93a140ae9a59c4886dfd7136417191a8ac35425f346d015daaa510a34e
SHA51212f23880d7804bccdeaaa5abdb37d63f1656dab8e53bf7637b8ebba317a67edc2f042f79d9a6af8322101dc2462c4788fac9faa788877192153396cced2d56ac
-
Filesize
260KB
MD536aa1e5cad51c47c3c9307e21a762b85
SHA1f472e8f1af0ed471958dcf8d77e530bc977c7ac3
SHA256ea765c93a140ae9a59c4886dfd7136417191a8ac35425f346d015daaa510a34e
SHA51212f23880d7804bccdeaaa5abdb37d63f1656dab8e53bf7637b8ebba317a67edc2f042f79d9a6af8322101dc2462c4788fac9faa788877192153396cced2d56ac
-
Filesize
260KB
MD536aa1e5cad51c47c3c9307e21a762b85
SHA1f472e8f1af0ed471958dcf8d77e530bc977c7ac3
SHA256ea765c93a140ae9a59c4886dfd7136417191a8ac35425f346d015daaa510a34e
SHA51212f23880d7804bccdeaaa5abdb37d63f1656dab8e53bf7637b8ebba317a67edc2f042f79d9a6af8322101dc2462c4788fac9faa788877192153396cced2d56ac