Analysis
-
max time kernel
151s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 09:12
Static task
static1
Behavioral task
behavioral1
Sample
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe
Resource
win10v2004-20221111-en
General
-
Target
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe
-
Size
248KB
-
MD5
badef9f09aef4c8a6dcf7733a07f6de6
-
SHA1
3f688cfbd1bac714fdef18352b017e9998fa389d
-
SHA256
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798
-
SHA512
9c83b1a6320b0ecb42e622c8bccf8d75c476e8ba365ab2bafd5a7aa038988b6665d06206e6b762b4d53fcef57bc8cf8a8082e333f1267492d2bfff71483af3df
-
SSDEEP
6144:urG4eE4kqADEty4kHuEAXhXyzFyEAv/sJ5UB6+u5onKPU/c/FH98uuO2:uneE4kpgdkOEAXAFHyH/c/FH98
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juiosus.exe -
Executes dropped EXE 1 IoCs
pid Process 576 juiosus.exe -
Loads dropped DLL 2 IoCs
pid Process 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe -
Adds Run key to start application 2 TTPs 44 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /s" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /K" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /M" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /G" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /j" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /r" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /z" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /v" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /a" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /h" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /m" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /W" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /y" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /F" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /q" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /T" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /S" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /U" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /f" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /B" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /Q" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /R" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /C" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /Z" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /V" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /J" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /n" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /o" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /Y" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /w" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /p" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /t" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /d" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /l" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /A" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /X" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /i" juiosus.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /k" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /I" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /E" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /c" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /N" juiosus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\juiosus = "C:\\Users\\Admin\\juiosus.exe /D" juiosus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe 576 juiosus.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 576 juiosus.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 576 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 28 PID 1276 wrote to memory of 576 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 28 PID 1276 wrote to memory of 576 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 28 PID 1276 wrote to memory of 576 1276 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe"C:\Users\Admin\AppData\Local\Temp\9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\juiosus.exe"C:\Users\Admin\juiosus.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD521c77ad5d8d449275c487ae4abd3a80d
SHA111494c54bd2fb084c15818caaa98ca77f17c337b
SHA256f211d8aba635241fb8c7f63f661f479f2f48a9c66326491660afe890ead68410
SHA512b49ee3ff01783faeb497ef693f0034720bac44e935bffaddfdfe131939cb953f74c7d6f83e9d6c68fc7c4f5dc2a26d438611054d6c962c02d4152acb67c13e1b
-
Filesize
248KB
MD521c77ad5d8d449275c487ae4abd3a80d
SHA111494c54bd2fb084c15818caaa98ca77f17c337b
SHA256f211d8aba635241fb8c7f63f661f479f2f48a9c66326491660afe890ead68410
SHA512b49ee3ff01783faeb497ef693f0034720bac44e935bffaddfdfe131939cb953f74c7d6f83e9d6c68fc7c4f5dc2a26d438611054d6c962c02d4152acb67c13e1b
-
Filesize
248KB
MD521c77ad5d8d449275c487ae4abd3a80d
SHA111494c54bd2fb084c15818caaa98ca77f17c337b
SHA256f211d8aba635241fb8c7f63f661f479f2f48a9c66326491660afe890ead68410
SHA512b49ee3ff01783faeb497ef693f0034720bac44e935bffaddfdfe131939cb953f74c7d6f83e9d6c68fc7c4f5dc2a26d438611054d6c962c02d4152acb67c13e1b
-
Filesize
248KB
MD521c77ad5d8d449275c487ae4abd3a80d
SHA111494c54bd2fb084c15818caaa98ca77f17c337b
SHA256f211d8aba635241fb8c7f63f661f479f2f48a9c66326491660afe890ead68410
SHA512b49ee3ff01783faeb497ef693f0034720bac44e935bffaddfdfe131939cb953f74c7d6f83e9d6c68fc7c4f5dc2a26d438611054d6c962c02d4152acb67c13e1b