Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe
Resource
win10v2004-20220812-en
General
-
Target
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe
-
Size
268KB
-
MD5
6fe94326a6de6d12e8ff322ebce37560
-
SHA1
8e40518921762b0991e85bb7bab0f5e71f3cae24
-
SHA256
1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011
-
SHA512
36ca899025eb73fa162c2f51516099aba335185e8b71307e179aad75d64603ae34436b4e8c57c2b2d0725aaeff29689fe8fdab183675b25570213afe59b478e0
-
SSDEEP
3072:ZsSQrIhFDY1zuBvLen8DlZniqBXv7yOsWvgbsmIHX0WRIh:ZCMk1qFy8xZnisyOs2tHEWRe
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" djreid.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 djreid.exe -
Loads dropped DLL 2 IoCs
pid Process 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /b" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /v" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /p" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /s" 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /c" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /r" djreid.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /e" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /k" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /h" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /j" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /o" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /a" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /n" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /s" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /t" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /l" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /y" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /u" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /g" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /z" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /w" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /x" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /i" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /d" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /f" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /q" djreid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\djreid = "C:\\Users\\Admin\\djreid.exe /m" djreid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe 1972 djreid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 1972 djreid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 1972 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 28 PID 856 wrote to memory of 1972 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 28 PID 856 wrote to memory of 1972 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 28 PID 856 wrote to memory of 1972 856 1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe"C:\Users\Admin\AppData\Local\Temp\1448985a2cac29977d527553951d5c04a72e9cda76f8ef1e5c7f6b61f1bdb011.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\djreid.exe"C:\Users\Admin\djreid.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD588d7ec2a4ec2088fba06461c37114cd3
SHA1b4500166f3f4c4f3117ec7065b0a3f16c65217c0
SHA2562dbb677965a34b4f7bf4f607f1766fead46c7b92f7b39de40d4714a05c77bf57
SHA51268367968e50cf850ad562a39e3fb357f777ff9306399e0afa06e99d95da2806bff1786d322baac099de66b9ba8a918a07f31a037050fed5938cab81d10bb9b7f
-
Filesize
268KB
MD588d7ec2a4ec2088fba06461c37114cd3
SHA1b4500166f3f4c4f3117ec7065b0a3f16c65217c0
SHA2562dbb677965a34b4f7bf4f607f1766fead46c7b92f7b39de40d4714a05c77bf57
SHA51268367968e50cf850ad562a39e3fb357f777ff9306399e0afa06e99d95da2806bff1786d322baac099de66b9ba8a918a07f31a037050fed5938cab81d10bb9b7f
-
Filesize
268KB
MD588d7ec2a4ec2088fba06461c37114cd3
SHA1b4500166f3f4c4f3117ec7065b0a3f16c65217c0
SHA2562dbb677965a34b4f7bf4f607f1766fead46c7b92f7b39de40d4714a05c77bf57
SHA51268367968e50cf850ad562a39e3fb357f777ff9306399e0afa06e99d95da2806bff1786d322baac099de66b9ba8a918a07f31a037050fed5938cab81d10bb9b7f
-
Filesize
268KB
MD588d7ec2a4ec2088fba06461c37114cd3
SHA1b4500166f3f4c4f3117ec7065b0a3f16c65217c0
SHA2562dbb677965a34b4f7bf4f607f1766fead46c7b92f7b39de40d4714a05c77bf57
SHA51268367968e50cf850ad562a39e3fb357f777ff9306399e0afa06e99d95da2806bff1786d322baac099de66b9ba8a918a07f31a037050fed5938cab81d10bb9b7f