Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 10:28
Static task
static1
Behavioral task
behavioral1
Sample
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe
Resource
win10v2004-20220812-en
General
-
Target
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe
-
Size
212KB
-
MD5
4c378acf5c11a25c7c3377ada09fb2ac
-
SHA1
842ab9bf9337e45a626e89674ee35602f7c063a1
-
SHA256
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e
-
SHA512
c65b7eeb0c318e73ec0af83bfee6fb7be4c9115b739230417aec55e4a1cd4bd4dccb24790e8e6bfe4dda0de05d3235387380fdde71ddc1a8137370938a538f34
-
SSDEEP
1536:wodH3UyOEGYf+u2wW4cd9Lv2PElgW7NoN274B/K51UtaHElfTczpqVar1/AgAIS:jUxS+Dzp+GNoN2I0jASrB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tlsib.exe -
Executes dropped EXE 1 IoCs
pid Process 1276 tlsib.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /m" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /h" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /v" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /l" tlsib.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /n" 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /u" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /o" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /t" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /n" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /f" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /x" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /w" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /a" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /j" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /s" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /g" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /p" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /c" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /b" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /d" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /q" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /r" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /k" tlsib.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /i" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /y" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /e" tlsib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tlsib = "C:\\Users\\Admin\\tlsib.exe /z" tlsib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe 1276 tlsib.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 1276 tlsib.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1276 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 27 PID 1324 wrote to memory of 1276 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 27 PID 1324 wrote to memory of 1276 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 27 PID 1324 wrote to memory of 1276 1324 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe"C:\Users\Admin\AppData\Local\Temp\23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\tlsib.exe"C:\Users\Admin\tlsib.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD504b3a4d0b3d7f975ca1e3f94161b1d21
SHA1424710ef84f7f45de616e7db1093315a19c79e95
SHA256793c5122068e55ac53ef7044c664328e687219764c28b57b90bd5bbf5b5728c9
SHA512185fd1f493b5a9112a6c0d709d92b47510138f7f83feaf45e96ed179419bbdb10e359275424c81f248ac4827029c0d6723b87824b95b26155197be4bbf1922bf
-
Filesize
212KB
MD504b3a4d0b3d7f975ca1e3f94161b1d21
SHA1424710ef84f7f45de616e7db1093315a19c79e95
SHA256793c5122068e55ac53ef7044c664328e687219764c28b57b90bd5bbf5b5728c9
SHA512185fd1f493b5a9112a6c0d709d92b47510138f7f83feaf45e96ed179419bbdb10e359275424c81f248ac4827029c0d6723b87824b95b26155197be4bbf1922bf
-
Filesize
212KB
MD504b3a4d0b3d7f975ca1e3f94161b1d21
SHA1424710ef84f7f45de616e7db1093315a19c79e95
SHA256793c5122068e55ac53ef7044c664328e687219764c28b57b90bd5bbf5b5728c9
SHA512185fd1f493b5a9112a6c0d709d92b47510138f7f83feaf45e96ed179419bbdb10e359275424c81f248ac4827029c0d6723b87824b95b26155197be4bbf1922bf
-
Filesize
212KB
MD504b3a4d0b3d7f975ca1e3f94161b1d21
SHA1424710ef84f7f45de616e7db1093315a19c79e95
SHA256793c5122068e55ac53ef7044c664328e687219764c28b57b90bd5bbf5b5728c9
SHA512185fd1f493b5a9112a6c0d709d92b47510138f7f83feaf45e96ed179419bbdb10e359275424c81f248ac4827029c0d6723b87824b95b26155197be4bbf1922bf