Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe
Resource
win10v2004-20220812-en
General
-
Target
af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe
-
Size
216KB
-
MD5
58ee9ad69a2526710ca380d49855a943
-
SHA1
035af4ea16bb107d3a139bcc943599b12d2dd381
-
SHA256
af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f
-
SHA512
ab2916dec14ce816c7edc273e79b2391671080f7f175e317cc6fd05aac1f5f90dff2ec68dea99fa364a057ae31a7eb26ffb021fa3d4d9f7a2c904873a076a221
-
SSDEEP
3072:eyEJuu3uXu+ho96wDO1kg3QHOtEOYXsjUj:T7hmnD0kd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuozau.exe -
Executes dropped EXE 1 IoCs
pid Process 1568 fuozau.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /q" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /g" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /i" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /w" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /l" fuozau.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /o" af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /c" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /p" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /j" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /k" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /s" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /v" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /e" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /z" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /r" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /m" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /y" fuozau.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /t" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /h" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /u" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /n" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /a" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /x" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /b" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /o" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /d" fuozau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuozau = "C:\\Users\\Admin\\fuozau.exe /f" fuozau.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe 4264 af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe 1568 fuozau.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4264 af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe 1568 fuozau.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4264 wrote to memory of 1568 4264 af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe 81 PID 4264 wrote to memory of 1568 4264 af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe 81 PID 4264 wrote to memory of 1568 4264 af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe"C:\Users\Admin\AppData\Local\Temp\af19151669764ccf81c138fa1fcd111f8d802a5205dc55ee8ca28824ba499a0f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\fuozau.exe"C:\Users\Admin\fuozau.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5718fbf5c6b4e1282010c2fc7121357f1
SHA1077ddc38eba6b56f074174c673fcca36e73f8c51
SHA2568a86844e0b20285f184e4386e077bd32360065bf53cf594260248ea6c16f0a44
SHA5124298e1e4c27b6a1da68e7815e644a09438a0161bb4a12bd2b4fb02bbfe5aded75efb4f13b4dc60ae848e7293115787ac3e05158f87233111aefa99bfe56dfdd7
-
Filesize
216KB
MD5718fbf5c6b4e1282010c2fc7121357f1
SHA1077ddc38eba6b56f074174c673fcca36e73f8c51
SHA2568a86844e0b20285f184e4386e077bd32360065bf53cf594260248ea6c16f0a44
SHA5124298e1e4c27b6a1da68e7815e644a09438a0161bb4a12bd2b4fb02bbfe5aded75efb4f13b4dc60ae848e7293115787ac3e05158f87233111aefa99bfe56dfdd7