Analysis
-
max time kernel
190s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 08:17
Static task
static1
Behavioral task
behavioral1
Sample
0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe
Resource
win10v2004-20220812-en
General
-
Target
0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe
-
Size
128KB
-
MD5
68b8f085ef2eda3c3f47e11d09d3ccd0
-
SHA1
4a1f9b84d04927477d5e5137de172f78e7baa2f9
-
SHA256
0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e
-
SHA512
a92af16d9933f00a03c736d15ec8d1d491047d61dbc5946954b17bbc3635a93c8ad10411c085886267f6297feed501b0942b28b563c531d422e48b71b647cf1c
-
SSDEEP
3072:I3wu13y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSsSTV:hu13yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaeehum.exe -
Executes dropped EXE 1 IoCs
pid Process 4576 kaeehum.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kaeehum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaeehum = "C:\\Users\\Admin\\kaeehum.exe" kaeehum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe 4576 kaeehum.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4956 0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe 4576 kaeehum.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4576 4956 0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe 81 PID 4956 wrote to memory of 4576 4956 0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe 81 PID 4956 wrote to memory of 4576 4956 0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe 81 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10 PID 4576 wrote to memory of 4956 4576 kaeehum.exe 10
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe"C:\Users\Admin\AppData\Local\Temp\0a2d11f917edcb758b1c417fc95d9dbaff6265c8a451cc339100afc92075016e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\kaeehum.exe"C:\Users\Admin\kaeehum.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5be311a19347ac1b1d4791c01444a37a7
SHA113d32e19c857ec647490d8aefcc18f729296bf7b
SHA256497e27269c26c896de48a29737ee7cc35c9e00a1f5328da46913c518fefd70f4
SHA512e8ddd6ddd576062decc2855503f5abf2f54ed6bcf69ebd1375431f3e58daed25ac4adf560c73d17954959ee35a74b57207456a698e0000bfb4ca4e4d1cfb551e
-
Filesize
128KB
MD5be311a19347ac1b1d4791c01444a37a7
SHA113d32e19c857ec647490d8aefcc18f729296bf7b
SHA256497e27269c26c896de48a29737ee7cc35c9e00a1f5328da46913c518fefd70f4
SHA512e8ddd6ddd576062decc2855503f5abf2f54ed6bcf69ebd1375431f3e58daed25ac4adf560c73d17954959ee35a74b57207456a698e0000bfb4ca4e4d1cfb551e