Analysis
-
max time kernel
153s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 23:45
Static task
static1
Behavioral task
behavioral1
Sample
7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe
Resource
win10v2004-20220901-en
General
-
Target
7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe
-
Size
268KB
-
MD5
77ce38a8e2ec054b4464327ba6adfb6e
-
SHA1
4baf37e86bed86636ff65a8a71dc90c84bf2a090
-
SHA256
7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4
-
SHA512
95cf789732e376cca42cb000640a24dd24a3a81f4d6928d89051e17bab922d3f6c0f5ebe1b626dba6d387a9223262da586323a00ba97c48673249912775a1bbc
-
SSDEEP
3072:IH0IbGACBCc5nNHf/1rc911SQwjRRQG20KJehxo4EzFTfG1eGqFMIAO:q+IIy910QmR20We7EzlmqZn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cauodu.exe -
Executes dropped EXE 1 IoCs
pid Process 588 cauodu.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /v" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /m" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /p" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /d" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /o" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /w" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /q" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /e" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /c" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /v" 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /u" cauodu.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /t" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /s" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /h" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /l" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /a" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /i" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /b" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /j" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /r" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /x" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /g" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /k" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /n" cauodu.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /y" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /z" cauodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauodu = "C:\\Users\\Admin\\cauodu.exe /f" cauodu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe 588 cauodu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 588 cauodu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 588 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 28 PID 1724 wrote to memory of 588 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 28 PID 1724 wrote to memory of 588 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 28 PID 1724 wrote to memory of 588 1724 7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe"C:\Users\Admin\AppData\Local\Temp\7442b91d9e692dd7880fd9667df9e097a63e030b2633f38a0071fbdbae69f5e4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\cauodu.exe"C:\Users\Admin\cauodu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD59076aed30754ba97026d1b52b4bc006c
SHA19e531253e6dd345d8e869fe24ecbc8500f26313d
SHA256a3ce4f6760f1f38cd61fced72fbb12132976b421bb69b5c85495cf0b918af957
SHA5128b5f7dc24a76e8460896bd07a0f1c2107611b74332ce964a6677f8565150844394f4abd0d050c9f0f27ce442cc553342ad8ebfbd8e54d323a465b70b4e06c8e6
-
Filesize
268KB
MD59076aed30754ba97026d1b52b4bc006c
SHA19e531253e6dd345d8e869fe24ecbc8500f26313d
SHA256a3ce4f6760f1f38cd61fced72fbb12132976b421bb69b5c85495cf0b918af957
SHA5128b5f7dc24a76e8460896bd07a0f1c2107611b74332ce964a6677f8565150844394f4abd0d050c9f0f27ce442cc553342ad8ebfbd8e54d323a465b70b4e06c8e6
-
Filesize
268KB
MD59076aed30754ba97026d1b52b4bc006c
SHA19e531253e6dd345d8e869fe24ecbc8500f26313d
SHA256a3ce4f6760f1f38cd61fced72fbb12132976b421bb69b5c85495cf0b918af957
SHA5128b5f7dc24a76e8460896bd07a0f1c2107611b74332ce964a6677f8565150844394f4abd0d050c9f0f27ce442cc553342ad8ebfbd8e54d323a465b70b4e06c8e6
-
Filesize
268KB
MD59076aed30754ba97026d1b52b4bc006c
SHA19e531253e6dd345d8e869fe24ecbc8500f26313d
SHA256a3ce4f6760f1f38cd61fced72fbb12132976b421bb69b5c85495cf0b918af957
SHA5128b5f7dc24a76e8460896bd07a0f1c2107611b74332ce964a6677f8565150844394f4abd0d050c9f0f27ce442cc553342ad8ebfbd8e54d323a465b70b4e06c8e6