Analysis
-
max time kernel
190s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe
Resource
win10v2004-20220812-en
General
-
Target
0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe
-
Size
128KB
-
MD5
61259ea7e1f809d49922f4de58668574
-
SHA1
9533da3b3d0f01fe674c2f81b22e4675aff50879
-
SHA256
0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0
-
SHA512
a94ab4fa6c6356077ac2f9ae3137fb745993e704eee35c2a2ec0bc977502546d0b2af308e1788aa8ba1b2582f7e5d71afee8c17acc6957c451d2029dc3fa082b
-
SSDEEP
3072:T6F3NDv3rd5N3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNSx:SNz3rdf3yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" daiice.exe -
Executes dropped EXE 1 IoCs
pid Process 4248 daiice.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ daiice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daiice = "C:\\Users\\Admin\\daiice.exe" daiice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe 4248 daiice.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4784 0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe 4248 daiice.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4248 4784 0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe 81 PID 4784 wrote to memory of 4248 4784 0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe 81 PID 4784 wrote to memory of 4248 4784 0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe 81 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80 PID 4248 wrote to memory of 4784 4248 daiice.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe"C:\Users\Admin\AppData\Local\Temp\0dd105184624c55b3099721c78f8638d9f8970179ee2189d145f9a1fda12ebf0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\daiice.exe"C:\Users\Admin\daiice.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5ab1e8d5491a980dcbf1fc7e5f953b3ff
SHA128edb10227ee159bdcf2761a2a2f6ecf0b8ea05d
SHA2569a2b9bb7ea1d30f8f6db07397554c282ed44589adfcd156c2e9fb7982514072b
SHA512c41453bc3ba672aea55a59454b2cecb7050a2c768c22724963e836ec58b704d4021027af1bde4561acad9f9a4c14d4416e5a52e54783e4a335474863803df48e
-
Filesize
128KB
MD5ab1e8d5491a980dcbf1fc7e5f953b3ff
SHA128edb10227ee159bdcf2761a2a2f6ecf0b8ea05d
SHA2569a2b9bb7ea1d30f8f6db07397554c282ed44589adfcd156c2e9fb7982514072b
SHA512c41453bc3ba672aea55a59454b2cecb7050a2c768c22724963e836ec58b704d4021027af1bde4561acad9f9a4c14d4416e5a52e54783e4a335474863803df48e