Analysis
-
max time kernel
171s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe
Resource
win10v2004-20220812-en
General
-
Target
9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe
-
Size
124KB
-
MD5
0030ebcc93d3a9e0d8de19ecb66ba2b0
-
SHA1
c3612cf8b71b0201d3710c106ef3336c76736642
-
SHA256
9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c
-
SHA512
bce810822e8972fb57ea6ebdcb4bfb548821722d85a3d3bff683e12b80f1e098721e3b6be11a67eca293e5294c288be8e3af7228983235a7a2adc0ecf391b78d
-
SSDEEP
1536:5DbeEFFH1/67NxkiQixA+alh98r8Y9USv1jylgwo7JaSi:ZbeEFv/67gjH8ri82gwQU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" motiy.exe -
Executes dropped EXE 1 IoCs
pid Process 1988 motiy.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /q" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /j" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /m" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /M" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /O" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /J" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /N" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /f" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /I" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /L" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /i" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /B" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /p" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /z" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /d" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /S" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /Y" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /T" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /V" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /C" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /U" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /w" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /H" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /Z" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /c" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /a" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /u" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /e" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /R" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /K" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /s" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /X" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /A" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /v" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /h" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /E" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /y" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /D" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /b" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /k" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /K" 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /W" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /l" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /t" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /o" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /r" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /n" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /G" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /Q" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /g" motiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\motiy = "C:\\Users\\Admin\\motiy.exe /x" motiy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe 1988 motiy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 1988 motiy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1988 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 27 PID 2040 wrote to memory of 1988 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 27 PID 2040 wrote to memory of 1988 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 27 PID 2040 wrote to memory of 1988 2040 9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe"C:\Users\Admin\AppData\Local\Temp\9b1096d5a4cfa2392ab24c33328d4937fe6303c9702a1eb73c59eb018d0b931c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\motiy.exe"C:\Users\Admin\motiy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5629684ea24cc3d670c59dcd4dcf66ba8
SHA128ca2ca1bcb2e6eaad590150667e9e56acf4d452
SHA25664454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9
SHA51284025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56
-
Filesize
124KB
MD5629684ea24cc3d670c59dcd4dcf66ba8
SHA128ca2ca1bcb2e6eaad590150667e9e56acf4d452
SHA25664454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9
SHA51284025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56
-
Filesize
124KB
MD5629684ea24cc3d670c59dcd4dcf66ba8
SHA128ca2ca1bcb2e6eaad590150667e9e56acf4d452
SHA25664454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9
SHA51284025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56
-
Filesize
124KB
MD5629684ea24cc3d670c59dcd4dcf66ba8
SHA128ca2ca1bcb2e6eaad590150667e9e56acf4d452
SHA25664454a987a8a8ebdb352c2f7ed2ab88aed53d432a76b2385c2c10408edc402e9
SHA51284025e1101784d02698dde8caf72649a5aabaf1f91ee8afe27978813eceba2d6b3adab81d44b6923e7f9eaa4405d88f322ef2aa47a716998ad96c7622e3b2f56