Analysis
-
max time kernel
228s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe
Resource
win10v2004-20220812-en
General
-
Target
92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe
-
Size
276KB
-
MD5
0af5789e9bdb2a01d155406cc7881ef0
-
SHA1
d1a8a15913a6f1f4086501a4eccd11a061c92612
-
SHA256
92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f
-
SHA512
e11624190e095ebeef31026a2b813eb93d1d22e822fe93948917cb7422cdb5153de6d57b5135f7846898fdd984c8025589150c539ce673d5c2475cfb1f555c7e
-
SSDEEP
6144:tUmkhRQaX/m7bfTWaxAQ9aLb+Kf6+2/MKsjh9Bqas5Ti3q/VlgAd:thkhRQaX/m7bfTWaVKf52/MKsjh90aQB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suaokuk.exe -
Executes dropped EXE 1 IoCs
pid Process 436 suaokuk.exe -
Loads dropped DLL 2 IoCs
pid Process 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /y" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /U" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /r" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /N" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /p" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /X" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /Z" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /E" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /V" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /a" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /k" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /b" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /f" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /A" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /C" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /g" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /x" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /I" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /Q" suaokuk.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /i" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /h" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /W" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /F" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /o" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /z" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /B" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /w" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /l" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /S" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /P" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /K" 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /T" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /n" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /H" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /K" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /L" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /G" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /u" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /R" suaokuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaokuk = "C:\\Users\\Admin\\suaokuk.exe /s" suaokuk.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe 436 suaokuk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 436 suaokuk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 436 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 28 PID 856 wrote to memory of 436 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 28 PID 856 wrote to memory of 436 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 28 PID 856 wrote to memory of 436 856 92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe"C:\Users\Admin\AppData\Local\Temp\92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\suaokuk.exe"C:\Users\Admin\suaokuk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD50b0c9efd3d1682930f924e13ffbf0a20
SHA1e9802ec14dbc12f7e9b6b31bc962dc60171e806c
SHA2563412d36d5d3997fd8280f4c0fe77aee7173211840259f333d8f507994dc93f5c
SHA5120fffb21139229486f41f7958e1f61b30634fa202f4fc9aa8a07367b876f4b2a19da5bcb47f460bc4bea15773efcb1216b7f6cce99b2708a70c6ef9673ff6ff43
-
Filesize
276KB
MD50b0c9efd3d1682930f924e13ffbf0a20
SHA1e9802ec14dbc12f7e9b6b31bc962dc60171e806c
SHA2563412d36d5d3997fd8280f4c0fe77aee7173211840259f333d8f507994dc93f5c
SHA5120fffb21139229486f41f7958e1f61b30634fa202f4fc9aa8a07367b876f4b2a19da5bcb47f460bc4bea15773efcb1216b7f6cce99b2708a70c6ef9673ff6ff43
-
Filesize
276KB
MD50b0c9efd3d1682930f924e13ffbf0a20
SHA1e9802ec14dbc12f7e9b6b31bc962dc60171e806c
SHA2563412d36d5d3997fd8280f4c0fe77aee7173211840259f333d8f507994dc93f5c
SHA5120fffb21139229486f41f7958e1f61b30634fa202f4fc9aa8a07367b876f4b2a19da5bcb47f460bc4bea15773efcb1216b7f6cce99b2708a70c6ef9673ff6ff43
-
Filesize
276KB
MD50b0c9efd3d1682930f924e13ffbf0a20
SHA1e9802ec14dbc12f7e9b6b31bc962dc60171e806c
SHA2563412d36d5d3997fd8280f4c0fe77aee7173211840259f333d8f507994dc93f5c
SHA5120fffb21139229486f41f7958e1f61b30634fa202f4fc9aa8a07367b876f4b2a19da5bcb47f460bc4bea15773efcb1216b7f6cce99b2708a70c6ef9673ff6ff43