Analysis
-
max time kernel
150s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe
Resource
win10v2004-20220901-en
General
-
Target
3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe
-
Size
100KB
-
MD5
bf092864b8fa2e77b0778ebe72106a3f
-
SHA1
abc854fc6e40bd947bb97245660dd40e8266bd04
-
SHA256
3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d
-
SHA512
dacfcc852cfdb653a99ffb739b87ec55a95556954b9d89d7f26f6a07b0e142a25df15d6c44320622b27683784b810def000ce307fefe510e19fbaa3c0db24825
-
SSDEEP
1536:DWtGF82NTzwYMGAc4ohrPXo+73Rez8b0SyuNIjnZq:3wHurPX7CuCnY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" laiizo.exe -
Executes dropped EXE 1 IoCs
pid Process 1548 laiizo.exe -
Loads dropped DLL 2 IoCs
pid Process 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /b" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /E" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /G" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /n" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /w" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /T" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /z" 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /M" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /I" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /Y" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /s" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /y" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /N" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /X" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /d" laiizo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /i" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /o" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /V" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /x" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /D" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /t" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /z" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /l" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /F" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /H" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /r" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /c" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /W" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /m" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /p" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /C" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /O" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /L" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /Z" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /S" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /B" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /J" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /f" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /A" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /P" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /U" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /K" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /a" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /R" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /q" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /g" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /v" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /e" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /k" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /u" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /h" laiizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laiizo = "C:\\Users\\Admin\\laiizo.exe /j" laiizo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe 1548 laiizo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 1548 laiizo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1548 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 26 PID 1452 wrote to memory of 1548 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 26 PID 1452 wrote to memory of 1548 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 26 PID 1452 wrote to memory of 1548 1452 3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe"C:\Users\Admin\AppData\Local\Temp\3f7ca312e6beefe46091bc979100fa1d6caac04d9a791b96e8f9aa78e6b29a6d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\laiizo.exe"C:\Users\Admin\laiizo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5649bc42ad9cbb7ff9da065cb5ea49140
SHA1cf29f1089a8f5b08cf1f7b24cf93150c14b1c42f
SHA25659f579db6cd35557a2788a570db7e838d662c58fc4be725bf37744a452f2796e
SHA5129424ccfd7476a7a46cefdf2ea644497ed66f450b90e5b3d511d0a76f3fdcb92a02261e7ad978e1837bd719084cd09ea75e6d040ea809d9b07afdafd4840efba7
-
Filesize
100KB
MD5649bc42ad9cbb7ff9da065cb5ea49140
SHA1cf29f1089a8f5b08cf1f7b24cf93150c14b1c42f
SHA25659f579db6cd35557a2788a570db7e838d662c58fc4be725bf37744a452f2796e
SHA5129424ccfd7476a7a46cefdf2ea644497ed66f450b90e5b3d511d0a76f3fdcb92a02261e7ad978e1837bd719084cd09ea75e6d040ea809d9b07afdafd4840efba7
-
Filesize
100KB
MD5649bc42ad9cbb7ff9da065cb5ea49140
SHA1cf29f1089a8f5b08cf1f7b24cf93150c14b1c42f
SHA25659f579db6cd35557a2788a570db7e838d662c58fc4be725bf37744a452f2796e
SHA5129424ccfd7476a7a46cefdf2ea644497ed66f450b90e5b3d511d0a76f3fdcb92a02261e7ad978e1837bd719084cd09ea75e6d040ea809d9b07afdafd4840efba7
-
Filesize
100KB
MD5649bc42ad9cbb7ff9da065cb5ea49140
SHA1cf29f1089a8f5b08cf1f7b24cf93150c14b1c42f
SHA25659f579db6cd35557a2788a570db7e838d662c58fc4be725bf37744a452f2796e
SHA5129424ccfd7476a7a46cefdf2ea644497ed66f450b90e5b3d511d0a76f3fdcb92a02261e7ad978e1837bd719084cd09ea75e6d040ea809d9b07afdafd4840efba7