Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe
Resource
win10v2004-20240412-en
General
-
Target
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe
-
Size
204KB
-
MD5
9dc85e494b87866a3132ffe13126a129
-
SHA1
75933e0355db4bbca4ef3ea291d4c239d8e8577a
-
SHA256
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787
-
SHA512
0ed69639530bbcc8dc4ccbba704c6fa843625eab149950a2f78a7a90b30a35bee0123d9c6bb057da2c71ed120114784b13e19c589f0efffa0e91a7d1932fad48
-
SSDEEP
3072:Amo8W8J0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWOL:bw+4QxL7B9W0c1RCzR/fSml7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exemiuxa.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miuxa.exe -
Executes dropped EXE 1 IoCs
Processes:
miuxa.exepid process 2344 miuxa.exe -
Loads dropped DLL 2 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exepid process 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe -
Adds Run key to start application 2 TTPs 27 IoCs
Processes:
miuxa.exedccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /e" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /g" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /j" dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /n" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /z" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /o" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /h" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /v" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /d" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /s" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /c" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /i" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /w" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /u" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /a" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /t" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /q" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /y" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /x" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /r" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /j" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /m" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /l" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /k" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /f" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /b" miuxa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miuxa = "C:\\Users\\Admin\\miuxa.exe /p" miuxa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exemiuxa.exepid process 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe 2344 miuxa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exemiuxa.exepid process 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe 2344 miuxa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exedescription pid process target process PID 2228 wrote to memory of 2344 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe miuxa.exe PID 2228 wrote to memory of 2344 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe miuxa.exe PID 2228 wrote to memory of 2344 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe miuxa.exe PID 2228 wrote to memory of 2344 2228 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe miuxa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe"C:\Users\Admin\AppData\Local\Temp\dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\miuxa.exe"C:\Users\Admin\miuxa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD58d0a9773c41cb8abc3b0013e9b01482c
SHA1d1b8e9a330c0c6c61cb1ce015a3b44e020de1519
SHA2564ccc5d2c158d9d5fa68d513767f4baadf9075da002d9c63d048a2f57016e6866
SHA51212452484f2ceaacb2c7bfd312a67cd6657c9f445380db88d8817d050e5328055b8312390f13a737f15edf8bf5782b2b5747d79020c20c878a0868a932bfbf31e