Analysis
-
max time kernel
179s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe
Resource
win10v2004-20220812-en
General
-
Target
4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe
-
Size
176KB
-
MD5
539f498151d2af7958ac8e1d7948b310
-
SHA1
aea8db48815331522bfe58902bbe1022fba7ec69
-
SHA256
4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880
-
SHA512
a6dd7c5ac33ef723c77e6e27cbad28067dea50ada01d9c14920088d75af8b3fd28b7c6d3cdde4ff689b51abd1ffacaf56f06587d0b510661b7b33dd07a4402f9
-
SSDEEP
3072:QC1IrOI+gj2HsfyKnvmb7/D26zjlBvWlzPpsPfIQ8sqLELTS55pMzcUK1eUyGeX:fI+1Knvmb7/D26zjlBvWhPpsPfIQ8sq0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lcjieq.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 lcjieq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /D" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /I" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /C" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /g" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /s" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /J" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /K" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /e" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /P" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /f" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /l" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /M" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /R" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /H" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /B" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /L" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /i" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /d" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /F" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /c" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /q" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /b" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /T" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /r" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /w" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /v" lcjieq.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /q" 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /p" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /X" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /y" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /t" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /O" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /N" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /U" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /j" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /h" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /m" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /x" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /E" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /z" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /o" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /W" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /Y" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /A" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /a" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /S" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /k" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /Q" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /Z" lcjieq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcjieq = "C:\\Users\\Admin\\lcjieq.exe /G" lcjieq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4964 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe 4964 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe 3104 lcjieq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4964 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe 3104 lcjieq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3104 4964 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe 82 PID 4964 wrote to memory of 3104 4964 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe 82 PID 4964 wrote to memory of 3104 4964 4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe"C:\Users\Admin\AppData\Local\Temp\4b47423fa2bfcc405eb9c0e13e5cf9fccc018fa3fc43dc9399d790f88d102880.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\lcjieq.exe"C:\Users\Admin\lcjieq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50ccc27648d2b67ca52b0c2057a3f4fee
SHA12ca8f2bf10133cf8d2d5947bdc8bd5cb64e030c7
SHA2567019f47b4ac98f090484ff20e04827a0b43c9ba7c0f5135da09b41ac20c41514
SHA5127ea1111a66c52a2ac31120a2ff20a31603739c798f55c650d7e0cbd327ac815f2e53582498e1578cae5e7a9dc428d233ffd7162a5f21311003cc0bc69bc8a734
-
Filesize
176KB
MD50ccc27648d2b67ca52b0c2057a3f4fee
SHA12ca8f2bf10133cf8d2d5947bdc8bd5cb64e030c7
SHA2567019f47b4ac98f090484ff20e04827a0b43c9ba7c0f5135da09b41ac20c41514
SHA5127ea1111a66c52a2ac31120a2ff20a31603739c798f55c650d7e0cbd327ac815f2e53582498e1578cae5e7a9dc428d233ffd7162a5f21311003cc0bc69bc8a734