Analysis
-
max time kernel
139s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe
Resource
win10v2004-20220812-en
General
-
Target
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe
-
Size
184KB
-
MD5
640d7f45c462bebee73b6e3ae2f03609
-
SHA1
00437bf48d7a811a8294b845d969d465ea6602e8
-
SHA256
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2
-
SHA512
d497c6deb494adf8a5158fe1258e068f8826e9b4b32077339ee09d203276901d41bf5a4dd38796dc7a3360a326032abc85978e2edc705b97b657d03332d58dbb
-
SSDEEP
3072:bwQPuusqJG6Z2C+yWKOSeu+yyF4GG5Mvq/g7g6pJ12qGoe/:bdcFluJqGom
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deocoam.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 deocoam.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /l" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /t" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /p" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /a" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /q" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /m" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /b" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /w" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /u" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /c" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /i" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /r" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /n" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /t" a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /h" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /z" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /f" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /k" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /d" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /g" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /e" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /o" deocoam.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /v" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /j" deocoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deocoam = "C:\\Users\\Admin\\deocoam.exe /y" deocoam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4688 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 4688 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe 1528 deocoam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4688 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 1528 deocoam.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4688 wrote to memory of 1528 4688 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 80 PID 4688 wrote to memory of 1528 4688 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 80 PID 4688 wrote to memory of 1528 4688 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe"C:\Users\Admin\AppData\Local\Temp\a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\deocoam.exe"C:\Users\Admin\deocoam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD52136142b3126f8fc4129b20c9c8f6579
SHA196a3a6a32505f744c8598957edf7fac83f83802d
SHA2565fbdff2be9ba54b365fb151f3300e3c711c563a8821643d7a06b4f81f7cb5da0
SHA512855d459647e1f249007e6cdb9e4a8c669f63d35952edda0bdc6a34b0114bc008cb51b921c27e20365559797cdf19ca30d9a46185a27095f5ec9a0a26f96b9e0f
-
Filesize
184KB
MD52136142b3126f8fc4129b20c9c8f6579
SHA196a3a6a32505f744c8598957edf7fac83f83802d
SHA2565fbdff2be9ba54b365fb151f3300e3c711c563a8821643d7a06b4f81f7cb5da0
SHA512855d459647e1f249007e6cdb9e4a8c669f63d35952edda0bdc6a34b0114bc008cb51b921c27e20365559797cdf19ca30d9a46185a27095f5ec9a0a26f96b9e0f