Analysis
-
max time kernel
188s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe
Resource
win10v2004-20220812-en
General
-
Target
51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe
-
Size
156KB
-
MD5
9760dcb81fdb189b7499580baac6af34
-
SHA1
8ee4a71afa156ee6dfe3f01a6b6b8d5968f40f6b
-
SHA256
51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd
-
SHA512
3252e06b52f112f1b20657c18a51906e2708520d4527f24fa81f5b7055dd160b70256f936beb472623c397f983dec75a273c29182850b6ae6c9f19c7bec68a2e
-
SSDEEP
3072:3sT0tVcx8jeFvB0Z/I8xSFJKxr2CrILdbdN:8xIcvqVuJyr2CMLxd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saofa.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 saofa.exe -
Loads dropped DLL 2 IoCs
pid Process 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /x" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /i" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /j" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /y" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /v" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /e" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /n" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /f" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /o" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /z" saofa.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /m" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /k" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /d" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /t" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /r" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /g" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /l" 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /q" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /u" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /h" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /s" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /l" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /a" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /b" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /p" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /w" saofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saofa = "C:\\Users\\Admin\\saofa.exe /c" saofa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe 1720 saofa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 1720 saofa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1720 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 27 PID 1536 wrote to memory of 1720 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 27 PID 1536 wrote to memory of 1720 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 27 PID 1536 wrote to memory of 1720 1536 51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe"C:\Users\Admin\AppData\Local\Temp\51e0e36b1563df4d3b467e627292231726f0f8d1a7ccecbf9cc42e971f4c12bd.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\saofa.exe"C:\Users\Admin\saofa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57a905c7bc54d11e196bf9a6374c9b061
SHA110fafe3a67347506d4e39e7b12a1f0d12b7b5c91
SHA256d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71
SHA5121ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec
-
Filesize
156KB
MD57a905c7bc54d11e196bf9a6374c9b061
SHA110fafe3a67347506d4e39e7b12a1f0d12b7b5c91
SHA256d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71
SHA5121ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec
-
Filesize
156KB
MD57a905c7bc54d11e196bf9a6374c9b061
SHA110fafe3a67347506d4e39e7b12a1f0d12b7b5c91
SHA256d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71
SHA5121ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec
-
Filesize
156KB
MD57a905c7bc54d11e196bf9a6374c9b061
SHA110fafe3a67347506d4e39e7b12a1f0d12b7b5c91
SHA256d1689a9d4240f614f131d031fca541773bee95c1eaf58b0d9b210ff0d23a9d71
SHA5121ddba98e2b1508f5ad39afca3741202b7ce594b7da666dba8743c8ea5ab7c225d8e2b0299ff65b7ddd7e50fd18d29f11693e97d1ab8ec56a36db2ea5467895ec