Analysis
-
max time kernel
85s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe
Resource
win10v2004-20220901-en
General
-
Target
e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe
-
Size
360KB
-
MD5
49f682d2f4a314edf6fea18ce1744b60
-
SHA1
3ea82dec2dac5a5c6b5d2fff8983b03ea13d0056
-
SHA256
e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56
-
SHA512
9c253abd6ab742f0ca2c198a888174b976aab7b995074dd840e7e0533bdeb1c46593bbe23651211d97b5c7a237e61bf15d027f7e58d3ddac772a9d9f1bb6cfe7
-
SSDEEP
6144:KGTTBOV6r4UZN6tj3tjuPQxD4b8/RqIsSp7ibSaZt/DIT4WT:lOVrUZN6tj99D4b8/EIsSp7ibSaZh0TV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suaba.exe -
Executes dropped EXE 1 IoCs
pid Process 1168 suaba.exe -
Loads dropped DLL 2 IoCs
pid Process 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /b" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /x" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /m" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /d" e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /u" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /r" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /k" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /i" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /q" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /a" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /t" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /f" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /e" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /z" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /p" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /v" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /h" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /j" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /w" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /o" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /s" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /c" suaba.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /l" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /y" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /d" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /g" suaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\suaba = "C:\\Users\\Admin\\suaba.exe /n" suaba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe 1168 suaba.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 1168 suaba.exe 1168 suaba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1168 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 27 PID 1516 wrote to memory of 1168 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 27 PID 1516 wrote to memory of 1168 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 27 PID 1516 wrote to memory of 1168 1516 e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe"C:\Users\Admin\AppData\Local\Temp\e86dbf428bcf0b7ddcb13597820512a4738143de2e2d8b7ac717f147f1cd1f56.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\suaba.exe"C:\Users\Admin\suaba.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD54538ef2418c008d91597d9271fac7322
SHA14a9eb40fab0340930b704a990d836f8b29051a8d
SHA256e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb
SHA512fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4
-
Filesize
360KB
MD54538ef2418c008d91597d9271fac7322
SHA14a9eb40fab0340930b704a990d836f8b29051a8d
SHA256e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb
SHA512fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4
-
Filesize
360KB
MD54538ef2418c008d91597d9271fac7322
SHA14a9eb40fab0340930b704a990d836f8b29051a8d
SHA256e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb
SHA512fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4
-
Filesize
360KB
MD54538ef2418c008d91597d9271fac7322
SHA14a9eb40fab0340930b704a990d836f8b29051a8d
SHA256e73b7f36a6d663e8b6d4292fba9d90948454c825e613de15499c34100055ccfb
SHA512fa0e60fd0a5fdf815b69f38adb48bfcc6930300d2ee7ac24649ea70cd7a459f0b04486eb9b566e85207850ff27edd2df1dd8446ee8980c843646b575f913edc4