Analysis
-
max time kernel
150s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:22
Static task
static1
Behavioral task
behavioral1
Sample
a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe
Resource
win10v2004-20220901-en
General
-
Target
a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe
-
Size
284KB
-
MD5
67d39fa67771560ea11cb83eed7bd187
-
SHA1
7f5c34858cd8925cb94d588f32980ea3c4d75d7a
-
SHA256
a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a
-
SHA512
dae011cb468dc80810c44fada3629bedfb259b6b3f68e07d53dda87f58d346e84cebaedd8a4fa6fb7234140ccf0188af8a57f53f3dd68d32e65569ad475f0111
-
SSDEEP
6144:eI8Y3PIXKnvmb7/D26wUnfiOR7MkJ5fAAygV9rMY6qG:JfIXKnvmb7/D26F/7Mk3fAjgV9rMuG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" toucae.exe -
Executes dropped EXE 1 IoCs
pid Process 588 toucae.exe -
Loads dropped DLL 2 IoCs
pid Process 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /a" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /A" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /x" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /i" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /z" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /I" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /p" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /q" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /M" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /V" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /H" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /P" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /k" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /e" toucae.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /Q" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /f" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /s" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /g" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /O" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /T" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /C" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /D" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /U" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /B" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /F" a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /t" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /Z" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /h" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /N" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /y" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /m" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /W" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /u" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /d" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /X" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /K" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /S" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /Y" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /v" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /o" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /l" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /j" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /R" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /F" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /b" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /r" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /w" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /c" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /n" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /J" toucae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\toucae = "C:\\Users\\Admin\\toucae.exe /L" toucae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe 588 toucae.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 588 toucae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 588 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 27 PID 620 wrote to memory of 588 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 27 PID 620 wrote to memory of 588 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 27 PID 620 wrote to memory of 588 620 a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe"C:\Users\Admin\AppData\Local\Temp\a40b138d8c0950a9fdda49670f06158548149daa7b80c04c318b5368ee013c7a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\toucae.exe"C:\Users\Admin\toucae.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD54addbe0a84f8673e4c5204f5a3032035
SHA1ad0bfb739e885dc87bca3962481cdf56be4e2ecb
SHA2562aa0a9a66542d1496c70ef79e33e2f715927d5f3211665d04691c0699bea3ac1
SHA512282849117431a83b5cbf95fae815cf9863f2f67197834212a3e793a0a0ea46457929934b302a6ef75b43a7dfcbc3929adbaf20e6e8acb2f09fc28fbddb41f422
-
Filesize
284KB
MD54addbe0a84f8673e4c5204f5a3032035
SHA1ad0bfb739e885dc87bca3962481cdf56be4e2ecb
SHA2562aa0a9a66542d1496c70ef79e33e2f715927d5f3211665d04691c0699bea3ac1
SHA512282849117431a83b5cbf95fae815cf9863f2f67197834212a3e793a0a0ea46457929934b302a6ef75b43a7dfcbc3929adbaf20e6e8acb2f09fc28fbddb41f422
-
Filesize
284KB
MD54addbe0a84f8673e4c5204f5a3032035
SHA1ad0bfb739e885dc87bca3962481cdf56be4e2ecb
SHA2562aa0a9a66542d1496c70ef79e33e2f715927d5f3211665d04691c0699bea3ac1
SHA512282849117431a83b5cbf95fae815cf9863f2f67197834212a3e793a0a0ea46457929934b302a6ef75b43a7dfcbc3929adbaf20e6e8acb2f09fc28fbddb41f422
-
Filesize
284KB
MD54addbe0a84f8673e4c5204f5a3032035
SHA1ad0bfb739e885dc87bca3962481cdf56be4e2ecb
SHA2562aa0a9a66542d1496c70ef79e33e2f715927d5f3211665d04691c0699bea3ac1
SHA512282849117431a83b5cbf95fae815cf9863f2f67197834212a3e793a0a0ea46457929934b302a6ef75b43a7dfcbc3929adbaf20e6e8acb2f09fc28fbddb41f422