Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
139ab01c732c8feee6e7c552b8bcb4ee.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
139ab01c732c8feee6e7c552b8bcb4ee.exe
Resource
win10v2004-20231215-en
General
-
Target
139ab01c732c8feee6e7c552b8bcb4ee.exe
-
Size
196KB
-
MD5
139ab01c732c8feee6e7c552b8bcb4ee
-
SHA1
3982ff87fedb3bca9fd9138d4a7f6efb5926fe67
-
SHA256
3a35b3edb71db2f46319ce22f442e1d163f671fc457ce6f26bc71a281ce40ff7
-
SHA512
466ec167340eaae1d4fda185d8d6e94df2fbb90a5a76a0d77d0763a29382258fb601f9969fed606ca4feb92b87ac14dbe2db052169bec3457b9ef0864917034f
-
SSDEEP
6144:KLuQuUPH3bX2a23NYcJQ8TfxZ85WJ007G9tSBN70ZfE:suQuUPH3bX2a23NYcJQ8TfxZ9J0rtSzN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 139ab01c732c8feee6e7c552b8bcb4ee.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cwduy.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 cwduy.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /w" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /q" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /J" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /c" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /m" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /V" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /s" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /p" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /t" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /E" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /T" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /l" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /A" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /P" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /v" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /i" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /u" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /M" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /n" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /g" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /o" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /z" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /N" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /W" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /y" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /C" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /f" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /K" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /e" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /Q" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /G" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /L" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /I" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /I" 139ab01c732c8feee6e7c552b8bcb4ee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /Z" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /X" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /O" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /F" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /j" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /B" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /R" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /h" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /b" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /Y" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /U" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /r" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /H" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /x" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /k" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /a" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /S" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /d" cwduy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\cwduy = "C:\\Users\\Admin\\cwduy.exe /D" cwduy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe 2952 cwduy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 2952 cwduy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2952 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 28 PID 1600 wrote to memory of 2952 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 28 PID 1600 wrote to memory of 2952 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 28 PID 1600 wrote to memory of 2952 1600 139ab01c732c8feee6e7c552b8bcb4ee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\139ab01c732c8feee6e7c552b8bcb4ee.exe"C:\Users\Admin\AppData\Local\Temp\139ab01c732c8feee6e7c552b8bcb4ee.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\cwduy.exe"C:\Users\Admin\cwduy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c3f481e6ec8edd8738ab10f0ddf0a4b6
SHA1c9effb68a0af5621d2f77a61f1f567be48886481
SHA256759750256f5b3b8392a3fb5a1d95b0718011c302d84c3636979894d1067a9ccb
SHA5127edd8a135a84482f1956cd197e40f05928359e225c3f1dd879ff2e130504b707f0f43da345864e305d2979fce323359f5aa82630b6c191ba707806fa11eb3095
-
Filesize
193KB
MD52e58fd5f5dae9a6374d3a507838c3395
SHA157c510e11827c746c09348642d141962055d7191
SHA256904b44bd3783e2ba9e4840d5d19980cf5e9c53edb08922fa93492637862ad1c1
SHA512414e934eb8de7ea9fe6212088f6a58c3d930721678bbbbda8cfc90d90a41ab436a115886d0c2e32970d37b3052b86975a30bfa9ceafead25d1a16c0757396171
-
Filesize
186KB
MD5c0031b09335396fec4b93b849a68631b
SHA12ef9ebd04901cd87e40ae75120d8ac0096af750f
SHA25655294102398d5ed3ebbede0dd2f3d04cb2404fdb0ab5cf025c53de06a2e410c0
SHA512bf10de0dadbcdec1b58c7a1c56dc42d983ec1b451592fa75633006b4096afe91581f81aebba2da4298e8323de5aaff6a6cd82ebdf999565ae0d68c9a0af64e7a
-
Filesize
196KB
MD5776085445e079051a3ccfe1626f166f2
SHA1fa2014558b972c76a03aa6f760c0e9e503768c48
SHA256bf56242a5d18e34eb22840e595a2681969930ef6606a955458bb2e91c6b79589
SHA51223776003d6d6e85b7a7cc5ab755b57b189b47adba82a5dd5cc18a48a3107b616683528f0affacc9adc0612a6040f123a541ebec4fa3700c14974146838066ffb
-
Filesize
167KB
MD5bf3b66634fd65f6726329065e7dd3f8c
SHA1b7c6f345e078a8cc2de240abc2495ff4bbc1e8f2
SHA2562553fdd68969066a0d11d30e4e6b5e8892f44beb0cd7685139e1f620377f699b
SHA512fae10043c309b9971ad67a2aff37bc7da853a61dce116623cc9319c2240777f2d13193c8099637993476ccb9d9416aa2950db1af3b46d560b30cce5f7385b68f