Analysis
-
max time kernel
158s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 03:09
Static task
static1
Behavioral task
behavioral1
Sample
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe
Resource
win10v2004-20220812-en
General
-
Target
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe
-
Size
252KB
-
MD5
687e67eda70f1f0792ed620dde8d3c75
-
SHA1
0ce413439a05778d8a160f905b2f6f88952cfe56
-
SHA256
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8
-
SHA512
f70397eb2ff1e0b87d01e68af4b1e2695bf5a52e6b3fb118d5552ed4341db1b1931324327bc70c23f766e2a312961765fc30677e0ef70cb9c708a09f67bf290e
-
SSDEEP
3072:xl0QmgYg9bVtgfzFHfzb51QRPr8GDi/7:xlWg59joFJyr8Gu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pimet.exe -
Executes dropped EXE 1 IoCs
pid Process 3532 pimet.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /p" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /W" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /h" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /l" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /e" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /s" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /T" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /N" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /b" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /K" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /H" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /q" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /B" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /R" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /v" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /U" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /j" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /c" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /O" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /J" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /g" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /z" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /y" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /Q" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /i" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /x" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /n" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /E" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /S" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /I" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /f" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /M" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /a" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /L" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /o" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /u" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /Z" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /V" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /A" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /d" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /t" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /w" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /F" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /r" pimet.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /P" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /C" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /Y" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /m" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /k" pimet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimet = "C:\\Users\\Admin\\pimet.exe /X" pimet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe 3532 pimet.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4864 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 3532 pimet.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3532 4864 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 81 PID 4864 wrote to memory of 3532 4864 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 81 PID 4864 wrote to memory of 3532 4864 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 81 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80 PID 3532 wrote to memory of 4864 3532 pimet.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe"C:\Users\Admin\AppData\Local\Temp\3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\pimet.exe"C:\Users\Admin\pimet.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD515f03e5caf5e4064d210ee7d19c4afe2
SHA104231a657b1f3ce6b740b995d12f686ed9fca863
SHA25695c1e2fcf0a48ec54daa8d3a0f4b51f7f15bc616c30c849f707cf34a63bbe5fd
SHA5124041d5d95a377f80705775a0b0bffec8e9f671704505616d50f273d7ebf4239b9996f40c6b9eeeb340ae5fb0a88188df4e5db65ef310472b21e866f87631d7e4
-
Filesize
252KB
MD515f03e5caf5e4064d210ee7d19c4afe2
SHA104231a657b1f3ce6b740b995d12f686ed9fca863
SHA25695c1e2fcf0a48ec54daa8d3a0f4b51f7f15bc616c30c849f707cf34a63bbe5fd
SHA5124041d5d95a377f80705775a0b0bffec8e9f671704505616d50f273d7ebf4239b9996f40c6b9eeeb340ae5fb0a88188df4e5db65ef310472b21e866f87631d7e4