Overview
overview
10Static
static
10ransomware...3n.exe
windows7-x64
ransomware...3n.exe
windows10-2004-x64
ransomware...le.exe
windows7-x64
ransomware...le.exe
windows10-2004-x64
ransomware...it.exe
windows7-x64
10ransomware...it.exe
windows10-2004-x64
10ransomware...le.exe
windows10-2004-x64
10ransomware... 5.exe
windows7-x64
10ransomware... 5.exe
windows10-2004-x64
10ransomware...de.exe
windows7-x64
10ransomware...de.exe
windows10-2004-x64
10ransomware...ck.exe
windows7-x64
7ransomware...ck.exe
windows10-2004-x64
7ransomware...ye.exe
windows7-x64
6ransomware...ye.exe
windows10-2004-x64
6ransomware...ap.exe
windows7-x64
6ransomware...ap.exe
windows10-2004-x64
6ransomware...ya.exe
windows7-x64
1ransomware...ya.exe
windows10-2004-x64
3ransomware...om.exe
windows7-x64
10ransomware...om.exe
windows10-2004-x64
10ransomware...ab.exe
windows7-x64
10ransomware...ab.exe
windows10-2004-x64
10ransomware...ye.exe
windows7-x64
10ransomware...ye.exe
windows10-2004-x64
10ransomware...ni.exe
windows7-x64
10ransomware...ni.exe
windows10-2004-x64
10ransomware...pt.exe
windows7-x64
10ransomware...pt.exe
windows10-2004-x64
10ransomware...ya.exe
windows7-x64
7ransomware...ya.exe
windows10-2004-x64
7ransomware...en.exe
windows7-x64
8Analysis
-
max time kernel
187s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ransomwares/Annabelle/Annabelle.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ransomwares/Annabelle/Annabelle.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ransomwares/BadRabbit/BadRabbit.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
ransomwares/BadRabbit/BadRabbit.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
ransomwares/Birele/Birele.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
ransomwares/Cerber 5/Cerber 5.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
ransomwares/Cerber 5/Cerber 5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
ransomwares/Darkside/Darkside.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
ransomwares/Darkside/Darkside.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
ransomwares/DeriaLock/DeriaLock.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
ransomwares/DeriaLock/DeriaLock.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
ransomwares/Fake GoldenEye/FakeGoldenEye.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
ransomwares/Fake GoldenEye/FakeGoldenEye.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
ransomwares/Fake PetrWrap/FakePetrWrap.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
ransomwares/Fake PetrWrap/FakePetrWrap.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
ransomwares/FakePetya/FakePetya.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
ransomwares/FakePetya/FakePetya.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
ransomwares/Fantom/Fantom.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
ransomwares/Fantom/Fantom.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
ransomwares/GandCrab/GandCrab.exe
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
ransomwares/GandCrab/GandCrab.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
ransomwares/GoldenEye/GoldenEye.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
ransomwares/GoldenEye/GoldenEye.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
ransomwares/Huzuni/Huzuni.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
ransomwares/Huzuni/Huzuni.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
ransomwares/InfinityCrypt/InfinityCrypt.exe
Resource
win7-20240215-en
Behavioral task
behavioral29
Sample
ransomwares/InfinityCrypt/InfinityCrypt.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
ransomwares/JanusPetya/JanusPetya.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
ransomwares/JanusPetya/JanusPetya.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral32
Sample
ransomwares/Krotten/Krotten.exe
Resource
win7-20240221-en
General
-
Target
ransomwares/Huzuni/Huzuni.exe
-
Size
65KB
-
MD5
e988915eb5706f5eeea7b684eec41a85
-
SHA1
05d11b2d393e68af9200fd23eee1ccc0f5850289
-
SHA256
06b8827fc8494e0e7b284a8dcb704e38169347fb857e4114813a2b8db206ec2c
-
SHA512
2b8a784fb2333c1b2313eb557dd0bc551403ff0ce9be5422241e5274ae2028487f1a4386fb098cb93bcb633cdefedc8bade80501ac919248455d53c974ab3e22
-
SSDEEP
1536:rmFEdOkJa9HLSQyzboPGRyfbYPstUKEMzL0HPV1vsHTV1:zwpi/5yFuKEM30HP7vsHT7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Huzuni.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" Huzuni.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification 1 IoCs
Processes:
Huzuni.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Huzuni.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
Huzuni.exepid process 2524 Huzuni.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc process File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 1452 vssadmin.exe 2188 vssadmin.exe 2380 vssadmin.exe 2112 vssadmin.exe 1056 vssadmin.exe 1692 vssadmin.exe 1168 vssadmin.exe 2088 vssadmin.exe 2012 vssadmin.exe 1624 vssadmin.exe 580 vssadmin.exe 344 vssadmin.exe 1160 vssadmin.exe 1736 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Huzuni.exepid process 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe 2524 Huzuni.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
vssvc.exeHuzuni.exedescription pid process Token: SeBackupPrivilege 2752 vssvc.exe Token: SeRestorePrivilege 2752 vssvc.exe Token: SeAuditPrivilege 2752 vssvc.exe Token: SeDebugPrivilege 2524 Huzuni.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
Huzuni.execmd.exeHuzuni.exedescription pid process target process PID 2700 wrote to memory of 2524 2700 Huzuni.exe Huzuni.exe PID 2700 wrote to memory of 2524 2700 Huzuni.exe Huzuni.exe PID 2700 wrote to memory of 2524 2700 Huzuni.exe Huzuni.exe PID 2700 wrote to memory of 2532 2700 Huzuni.exe cmd.exe PID 2700 wrote to memory of 2532 2700 Huzuni.exe cmd.exe PID 2700 wrote to memory of 2532 2700 Huzuni.exe cmd.exe PID 2532 wrote to memory of 2012 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2012 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2012 2532 cmd.exe vssadmin.exe PID 2524 wrote to memory of 2744 2524 Huzuni.exe cmd.exe PID 2524 wrote to memory of 2744 2524 Huzuni.exe cmd.exe PID 2524 wrote to memory of 2744 2524 Huzuni.exe cmd.exe PID 2532 wrote to memory of 1452 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1452 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1452 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2112 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2112 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2112 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1056 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1056 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1056 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 344 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 344 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 344 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1692 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1692 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1692 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1624 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1624 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1624 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1168 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1168 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1168 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1160 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1160 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1160 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2088 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2088 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2088 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2188 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2188 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2188 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 580 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 580 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 580 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1736 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1736 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1736 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2380 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2380 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 2380 2532 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ransomwares\Huzuni\Huzuni.exe"C:\Users\Admin\AppData\Local\Temp\ransomwares\Huzuni\Huzuni.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Huzuni.exe"C:\Huzuni.exe"2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /takeown /f C:\Windows\System32\Taskmgr.exe && icacls C:\Windows\System32\Taskmgr.exe /grant %username%:F && del C:\Windows\System32\Taskmgr.exe && exit3⤵PID:2744
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\window.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\vssadmin.exevssadmin Delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2012
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1452
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2112
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=d: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1056
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:344
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1692
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1624
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1168
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1160
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2088
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2188
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:580
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1736
-
-
C:\Windows\system32\vssadmin.exevssadmin Delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2380
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5ea9c5fca65378fe641a1b708187a582f
SHA1c7dba2587ffd02071fe12fdec646d70cf86d7f9e
SHA2560ce2f58a1b2c0d87c054ef212914d84ffeac59243b4a8a3a9c615c876638d87d
SHA5121006b532ad2df8532be3fe651d24908e0b83240bf5af4ef52ba6341d56eac93fc35d75ae499b0f473354e3fc100d629a22daae206e4d05124842135559ca64ec
-
Filesize
780KB
MD5d1f50c10e8e47e90e67c4434e68a805c
SHA114fbb9b4e6b08057495389037cea028c165a572e
SHA25678ee1f6326c19ec2c663ba983a967b3bc643856ae9623c36194c1afcb072abd1
SHA512fafcfaa01cd6919e2b3cba02a2ca5e16f4bb07d9f7433f544420853b8cab703489f00aab604c5015ef38fa63769e16c4b0e8f224b351ae4c392d4fdc075ba56c
-
Filesize
1KB
MD59dba906094ee0f15f38e0640e5923270
SHA10118a885480cd04c5a4310fd3d39251dd769a3a5
SHA2560e79efbeae919d458e637000c20e4e71ddb916903527c593248038a78358f57d
SHA512e6985edc821486ce4ef0f467f348734ccab4aa1bacf961c4168de4e881960954a2c2c503824c9cc9f639ad9fff2e2df79241a75bf84cae99028082bdceee28e9