Analysis
-
max time kernel
157s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:45
Static task
static1
Behavioral task
behavioral1
Sample
ac44be360811ad7bedb0985b6c0283e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ac44be360811ad7bedb0985b6c0283e2.exe
Resource
win10v2004-20231215-en
General
-
Target
ac44be360811ad7bedb0985b6c0283e2.exe
-
Size
116KB
-
MD5
ac44be360811ad7bedb0985b6c0283e2
-
SHA1
77a62a4f616ea73976a266010ba59f5b75d0211a
-
SHA256
9eb7d6b504aa4033118f7c0848869b1529f60c397a450e6f66f6772717de5575
-
SHA512
b813f5e37d0c0bbc81ccf6fe9f12e23ab26b0e11221240e25215313a92bcb20c6c227f3d3ce414d6754f6d0f90aa023f989d0d530d64c9beb42207b947171950
-
SSDEEP
1536:X/0TcIg9MtpJFmAGUk+++pZgGEbplftRkDhfdxoMqYjFe1Jsl0KuwOZZZZH1gMiV:P0TUMBFmAGUIRsjsO0xdZZZZVg3x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ac44be360811ad7bedb0985b6c0283e2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cauofi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation ac44be360811ad7bedb0985b6c0283e2.exe -
Executes dropped EXE 1 IoCs
pid Process 4896 cauofi.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /w" ac44be360811ad7bedb0985b6c0283e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /f" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /m" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /a" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /k" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /u" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /g" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /b" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /l" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /j" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /v" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /p" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /y" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /x" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /d" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /e" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /c" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /s" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /z" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /t" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /w" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /h" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /i" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /o" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /r" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /q" cauofi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauofi = "C:\\Users\\Admin\\cauofi.exe /n" cauofi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4936 ac44be360811ad7bedb0985b6c0283e2.exe 4936 ac44be360811ad7bedb0985b6c0283e2.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe 4896 cauofi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4936 ac44be360811ad7bedb0985b6c0283e2.exe 4896 cauofi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4896 4936 ac44be360811ad7bedb0985b6c0283e2.exe 96 PID 4936 wrote to memory of 4896 4936 ac44be360811ad7bedb0985b6c0283e2.exe 96 PID 4936 wrote to memory of 4896 4936 ac44be360811ad7bedb0985b6c0283e2.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac44be360811ad7bedb0985b6c0283e2.exe"C:\Users\Admin\AppData\Local\Temp\ac44be360811ad7bedb0985b6c0283e2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\cauofi.exe"C:\Users\Admin\cauofi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5aae6a60b9b31bbca2089b7649adacd31
SHA1636a9782d116cf16471eda5c2f4f46c1144edc8c
SHA25616799089092dd24af98bfd3670aa99d186e536b9db0b891011ab0f4a34c432c5
SHA51253bb3bf7e9a44572da8e2704d3d356af725f284deee8ff01b8ef1e7502438feeeb16225c3f46bf6c76bb1740688a840b04152eea37d828e8584c0211f533c817