Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe
Resource
win10v2004-20220812-en
General
-
Target
1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe
-
Size
148KB
-
MD5
71d23428b9223aa5b633eb880a453134
-
SHA1
9d50076b6505b39c44e35597187b7dc23c420762
-
SHA256
1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae
-
SHA512
eb763ce90ff99a3591b01eb557e169d1fafd3e5440eec717a8caefb38159c4be932d22e8da7368bccbfad2d7767f58403a9aa715ec816b9e64504e19e00c8928
-
SSDEEP
3072:/iFDQh4mRpDGq7At/yRWr2wA36nbMUq8hFOdhIk4oQZiE1h:KFch96F90Wf7nJPwdzWl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuuton.exe -
Executes dropped EXE 1 IoCs
pid Process 1292 tuuton.exe -
Loads dropped DLL 2 IoCs
pid Process 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /y" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /B" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /E" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /e" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /C" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /o" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /K" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /L" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /O" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /m" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /U" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /V" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /W" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /j" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /T" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /k" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /d" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /F" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /M" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /r" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /N" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /s" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /A" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /u" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /t" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /w" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /z" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /P" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /f" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /a" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /Z" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /q" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /D" tuuton.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /X" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /l" tuuton.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /Q" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /x" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /G" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /n" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /H" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /h" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /p" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /Q" 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /I" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /S" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /J" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /i" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /c" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /g" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /b" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /R" tuuton.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuuton = "C:\\Users\\Admin\\tuuton.exe /v" tuuton.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe 1292 tuuton.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 1292 tuuton.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 108 wrote to memory of 1292 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 27 PID 108 wrote to memory of 1292 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 27 PID 108 wrote to memory of 1292 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 27 PID 108 wrote to memory of 1292 108 1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe"C:\Users\Admin\AppData\Local\Temp\1cf1372f099c194eddeae825e7b317a7cea1089754c28f57a62a514ed8cf0bae.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\tuuton.exe"C:\Users\Admin\tuuton.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5e6a068a5de92ee79323eec93feb17160
SHA19ca1b6a4885ee8ce9ff8d3ff5e10e89a5c9f1eea
SHA256fbd94eee87bc950f4f96580c552b83a0f97fdd7dd3aeec5919b69784d40c77a3
SHA512a70e74c3c85d640d32ddfc33eff18f0e136aece71891428472f074d83e87eba365b037f0bdea20f8c4a15ef0edc663e932466be9d2ddc6c3d5228eddfb758295
-
Filesize
148KB
MD5e6a068a5de92ee79323eec93feb17160
SHA19ca1b6a4885ee8ce9ff8d3ff5e10e89a5c9f1eea
SHA256fbd94eee87bc950f4f96580c552b83a0f97fdd7dd3aeec5919b69784d40c77a3
SHA512a70e74c3c85d640d32ddfc33eff18f0e136aece71891428472f074d83e87eba365b037f0bdea20f8c4a15ef0edc663e932466be9d2ddc6c3d5228eddfb758295
-
Filesize
148KB
MD5e6a068a5de92ee79323eec93feb17160
SHA19ca1b6a4885ee8ce9ff8d3ff5e10e89a5c9f1eea
SHA256fbd94eee87bc950f4f96580c552b83a0f97fdd7dd3aeec5919b69784d40c77a3
SHA512a70e74c3c85d640d32ddfc33eff18f0e136aece71891428472f074d83e87eba365b037f0bdea20f8c4a15ef0edc663e932466be9d2ddc6c3d5228eddfb758295
-
Filesize
148KB
MD5e6a068a5de92ee79323eec93feb17160
SHA19ca1b6a4885ee8ce9ff8d3ff5e10e89a5c9f1eea
SHA256fbd94eee87bc950f4f96580c552b83a0f97fdd7dd3aeec5919b69784d40c77a3
SHA512a70e74c3c85d640d32ddfc33eff18f0e136aece71891428472f074d83e87eba365b037f0bdea20f8c4a15ef0edc663e932466be9d2ddc6c3d5228eddfb758295