Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
21f4cc20e7ac31bf409f6685ad8c5521.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21f4cc20e7ac31bf409f6685ad8c5521.exe
Resource
win10v2004-20231215-en
General
-
Target
21f4cc20e7ac31bf409f6685ad8c5521.exe
-
Size
100KB
-
MD5
21f4cc20e7ac31bf409f6685ad8c5521
-
SHA1
ad12b494c0141ab94e68b718f694ef65faefbe26
-
SHA256
19fe9d965d4b966ef990420a6fc9b661fe3ee3a9f3aeda27fca056bb5c89a70f
-
SHA512
9d65788952fa8670f5f9e83348f38c78240c549d7c2ed5795c9bf4bd3b47036735698569d3035fbaddc031d2d89d5889111a778d610ff483dedadd65860aeb1a
-
SSDEEP
1536:m7tGM82NTzwlMGAc4ohrPXo+73Rez8b0Sy1NIjnZr7:UwcurPX7C1Cnt7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 21f4cc20e7ac31bf409f6685ad8c5521.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceupuw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 21f4cc20e7ac31bf409f6685ad8c5521.exe -
Executes dropped EXE 1 IoCs
pid Process 220 ceupuw.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /g" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /N" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /k" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /c" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /K" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /W" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /I" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /h" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /n" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /v" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /B" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /Q" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /e" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /D" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /w" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /L" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /M" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /E" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /y" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /H" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /s" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /T" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /S" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /F" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /j" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /G" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /R" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /q" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /u" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /x" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /O" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /t" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /o" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /Z" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /p" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /C" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /A" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /i" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /Y" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /a" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /z" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /P" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /J" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /d" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /f" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /r" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /e" 21f4cc20e7ac31bf409f6685ad8c5521.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /b" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /U" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /V" ceupuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceupuw = "C:\\Users\\Admin\\ceupuw.exe /X" ceupuw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 21f4cc20e7ac31bf409f6685ad8c5521.exe 2028 21f4cc20e7ac31bf409f6685ad8c5521.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe 220 ceupuw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2028 21f4cc20e7ac31bf409f6685ad8c5521.exe 220 ceupuw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2028 wrote to memory of 220 2028 21f4cc20e7ac31bf409f6685ad8c5521.exe 93 PID 2028 wrote to memory of 220 2028 21f4cc20e7ac31bf409f6685ad8c5521.exe 93 PID 2028 wrote to memory of 220 2028 21f4cc20e7ac31bf409f6685ad8c5521.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\21f4cc20e7ac31bf409f6685ad8c5521.exe"C:\Users\Admin\AppData\Local\Temp\21f4cc20e7ac31bf409f6685ad8c5521.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\ceupuw.exe"C:\Users\Admin\ceupuw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e90b6caeaf4ce4fbb766b73d1ea52f3f
SHA1c8e34e37cfce9e8d7c75dcb4aff2bfc777be6ed1
SHA256e7d4106f717adca6a96554608b02f7ded462f289db84245272e3257b937efae6
SHA5127bd3f6250c249ab49b1db1c40df4dcc9f9e923ae77d3198e3a08e55041fe1cc9b8cd45ae0a01d8b4ffc88f62d0770ced0b275de4cf0e9d126413f575a911e09d