Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe
Resource
win10v2004-20240508-en
General
-
Target
095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe
-
Size
53KB
-
MD5
18cc8fbfa8cd10d3e45829ea16cb4a3c
-
SHA1
bc67a5229f09a0c797f9969dee86451b96b91f63
-
SHA256
095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07
-
SHA512
347a987c127e04ce6676f96cdea96300149d6c4b20d3a6bfe46ea00abf655ad8c6f27c225d123e36f88f0f2f521af0bcdcef323c9744a7f7db0438b36858b541
-
SSDEEP
1536:vNzg8r8QU+tvk7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:O+tMJJjmLM3zRJWZsXy4J9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muixii.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 muixii.exe -
Loads dropped DLL 2 IoCs
pid Process 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\muixii = "C:\\Users\\Admin\\muixii.exe" muixii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe 2740 muixii.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe 2740 muixii.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 108 wrote to memory of 2740 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe 28 PID 108 wrote to memory of 2740 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe 28 PID 108 wrote to memory of 2740 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe 28 PID 108 wrote to memory of 2740 108 095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe 28 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27 PID 2740 wrote to memory of 108 2740 muixii.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe"C:\Users\Admin\AppData\Local\Temp\095a509859a5993c024a038862ad080794de40d3f91347db6a0264f7f8709c07.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\muixii.exe"C:\Users\Admin\muixii.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5c97b0c4efd4aa6cb216fff67b5378212
SHA1fb9c09e2889369383aadb2ff1397c9251a5b0fbd
SHA2562853f50ee61d44166917afa70e4238fb0ada1bf56796fd0607ede85a1af327d4
SHA512cc3a9f3cbbe40b2a97b561b2e65f464eb923a3a05d7960336888edb0c907a987f7115e8ac8a7ca051743e997f1f8ea7abce0031573a1a219ac5d3a119ef3b42d