Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe
Resource
win10v2004-20240412-en
General
-
Target
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe
-
Size
112KB
-
MD5
2a7f4effea3ac0d4ee05b34c2d899bce
-
SHA1
f8c26a7bb4c02bc795115d6fc0172ff087494b4f
-
SHA256
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40
-
SHA512
3f78240cd9304eee9b1c8f3bafd8af214ff21afd93c7c83149044e2cf716a7c0382b3b48a3f8478c52567c6a35fed4f3d1ed3a463254c2f84d2cbd4d52a18be5
-
SSDEEP
1536:vP0TcIH9MtpJzUk+++pZgGEbplftRkDhfdxoMqYjFe1Js:30TXMBzUIRsjs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exetueije.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tueije.exe -
Executes dropped EXE 1 IoCs
Processes:
tueije.exepid process 2844 tueije.exe -
Loads dropped DLL 2 IoCs
Processes:
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exepid process 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe -
Adds Run key to start application 2 TTPs 27 IoCs
Processes:
tueije.exed706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /j" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /w" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /m" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /p" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /e" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /a" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /u" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /r" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /d" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /f" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /n" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /f" d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /x" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /v" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /b" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /c" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /y" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /q" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /k" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /t" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /s" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /g" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /h" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /i" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /z" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /l" tueije.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\tueije = "C:\\Users\\Admin\\tueije.exe /o" tueije.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exetueije.exepid process 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe 2844 tueije.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exetueije.exepid process 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe 2844 tueije.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exedescription pid process target process PID 1708 wrote to memory of 2844 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe tueije.exe PID 1708 wrote to memory of 2844 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe tueije.exe PID 1708 wrote to memory of 2844 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe tueije.exe PID 1708 wrote to memory of 2844 1708 d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe tueije.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe"C:\Users\Admin\AppData\Local\Temp\d706a3416ff30218288048e7ed41f721ddaead754e41b8fe643afea6b7acbb40.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\tueije.exe"C:\Users\Admin\tueije.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5cfe53dc4928a31f1b4313e37f3ed3700
SHA1ae8eac3fe4e28b1888246e6f6a8e7b003169145e
SHA2568be36f9a4615d7fb4aaa0875a86bab522b322fd8bdc68f44b95e544f99c426fa
SHA51264153031b48e385d3cd8bebb03ad9d0a98a8eca4d5efabbb7d4fb5d38823a63dd0e23e7a7c7a06c854d359342b490506a8ad9e86776e3a00ffe095e3342d37b0