Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
fb227cea125ea34bc8466b9ab2625fa1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fb227cea125ea34bc8466b9ab2625fa1.exe
Resource
win10v2004-20231215-en
General
-
Target
fb227cea125ea34bc8466b9ab2625fa1.exe
-
Size
68KB
-
MD5
fb227cea125ea34bc8466b9ab2625fa1
-
SHA1
c2c61e18d1ea39e56473f1099dc5f93ad2a51988
-
SHA256
786ba48d5bc8833a933eaa85dbf5ed3c8bf59af7c210c4625968b5ce994a1e07
-
SHA512
4865622759b08ad0da179e89bf533d2870547990c6cd03d3b114ad8e671878a7ce57eb2dd66d4154dcb22b61b3f5902469a47e69420aff648614d134b47216e2
-
SSDEEP
768:tj9Qmo+O5LU0dcxmJUMncu/VLHpFIkid+JFIkNcr9fLkWEUYn6sNpcspj6W8Lx42:tj9Qd+QvgM/AQmSNFONMlszAjUkx1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kfyuiz.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 kfyuiz.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 fb227cea125ea34bc8466b9ab2625fa1.exe 2868 fb227cea125ea34bc8466b9ab2625fa1.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /y" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /d" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /t" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /g" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /B" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /r" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /v" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /Q" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /a" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /e" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /j" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /P" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /D" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /L" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /z" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /p" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /o" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /A" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /I" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /s" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /M" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /m" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /V" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /E" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /C" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /h" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /c" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /x" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /f" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /U" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /R" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /O" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /W" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /n" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /w" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /J" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /N" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /G" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /H" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /Z" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /l" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /T" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /q" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /k" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /i" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /u" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /K" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /Y" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /F" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /b" kfyuiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\kfyuiz = "C:\\Users\\Admin\\kfyuiz.exe /X" kfyuiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe 2520 kfyuiz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 fb227cea125ea34bc8466b9ab2625fa1.exe 2520 kfyuiz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2520 2868 fb227cea125ea34bc8466b9ab2625fa1.exe 28 PID 2868 wrote to memory of 2520 2868 fb227cea125ea34bc8466b9ab2625fa1.exe 28 PID 2868 wrote to memory of 2520 2868 fb227cea125ea34bc8466b9ab2625fa1.exe 28 PID 2868 wrote to memory of 2520 2868 fb227cea125ea34bc8466b9ab2625fa1.exe 28 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1 PID 2520 wrote to memory of 2868 2520 kfyuiz.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb227cea125ea34bc8466b9ab2625fa1.exe"C:\Users\Admin\AppData\Local\Temp\fb227cea125ea34bc8466b9ab2625fa1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\kfyuiz.exe"C:\Users\Admin\kfyuiz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520
-