Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
Resource
win10v2004-20240412-en
General
-
Target
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
-
Size
56KB
-
MD5
917c6cc6e5b048e49a7643420e159f00
-
SHA1
29443ce4b55d294023a2282df82508f86dee117d
-
SHA256
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed
-
SHA512
b0d95a1c9b74f25f3a285ec04d4853277f889cbd997a2e7a87e0a9fd52160994c90845e4a94214d2a865c1ca79fee23b7e4cdb6653c54383373f26083ad17947
-
SSDEEP
1536:SqkcMAQgnRt9UdLw6BNMyBhXZxHJ6P6D5B0qEy:Mgz07JjD5B7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muguy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe -
Executes dropped EXE 1 IoCs
pid Process 3548 muguy.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /n" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /f" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /b" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /X" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /y" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /G" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /A" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /Q" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /Y" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /z" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /o" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /E" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /t" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /i" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /w" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /F" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /T" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /J" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /P" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /d" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /a" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /l" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /k" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /h" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /M" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /I" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /W" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /e" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /K" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /O" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /j" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /r" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /L" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /R" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /m" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /N" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /x" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /H" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /U" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /p" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /Z" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /g" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /c" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /B" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /s" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /S" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /v" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /u" muguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muguy = "C:\\Users\\Admin\\muguy.exe /q" muguy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe 3548 muguy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 3548 muguy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3548 3012 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 89 PID 3012 wrote to memory of 3548 3012 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 89 PID 3012 wrote to memory of 3548 3012 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 89 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84 PID 3548 wrote to memory of 3012 3548 muguy.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe"C:\Users\Admin\AppData\Local\Temp\1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\muguy.exe"C:\Users\Admin\muguy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5e4c5d85fc98ff04fa452889c9e23c03a
SHA1bf6e885a56551de1280f58afef1df05cfa2e15bd
SHA256d35f50c279970e29d60813ce7cd39cfb6cad77d1636225eef3e919b4a79272ee
SHA5121d097c32f40e31f3fb23c3372e607a0ef3e3e59761c5e73e2b456b75f5f2d93856fede88d08c25a40f5ee66d0b697a7103f24e58855f08d28654f8327552096e