Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe
Resource
win10v2004-20220901-en
General
-
Target
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe
-
Size
240KB
-
MD5
2ad57e6c403762e54c645f2a4f89dbd0
-
SHA1
0192de848197aa516cc4bc79f93bd56c14f35469
-
SHA256
7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230
-
SHA512
1b85c6cb7279a89578ee91e73aec45963591fa7816eab92cf35e6eb849cfe0d1090f2480643437fcac27b01b945351e4aa441ba76fa5283827a13a2d6fc1908f
-
SSDEEP
3072:xkNaT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5cz7/:xl0UGKGkFRKfeoztO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boaiye.exe -
Executes dropped EXE 1 IoCs
pid Process 4424 boaiye.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /f" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /e" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /u" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /a" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /w" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /z" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /b" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /s" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /i" boaiye.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /x" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /y" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /t" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /q" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /c" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /k" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /m" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /v" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /r" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /l" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /p" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /o" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /n" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /g" boaiye.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /b" 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /h" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /d" boaiye.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boaiye = "C:\\Users\\Admin\\boaiye.exe /j" boaiye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 1056 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe 4424 boaiye.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1056 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 4424 boaiye.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4424 1056 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 81 PID 1056 wrote to memory of 4424 1056 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 81 PID 1056 wrote to memory of 4424 1056 7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe"C:\Users\Admin\AppData\Local\Temp\7528a08ee168e67b9b4b6a7383e851e028303a64d171679de3f355f6fc5f1230.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\boaiye.exe"C:\Users\Admin\boaiye.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD52cd417606570a5f7e742649d949412e4
SHA1c20eee63531a4bf2093e8442b739935d9c434abc
SHA256624ac3d4daef616d0ca6cb868a1add15aa188b1b82694b6832c368931a692a6f
SHA512f61a92c58d7da9dbd01580b4ef2370801205ce5293714ee3e4830c1c97eb1ddcd1c5ca9967ba1f7aa864840b8786ad5b690e944fa26e71e9d3def4d3004095bc
-
Filesize
240KB
MD52cd417606570a5f7e742649d949412e4
SHA1c20eee63531a4bf2093e8442b739935d9c434abc
SHA256624ac3d4daef616d0ca6cb868a1add15aa188b1b82694b6832c368931a692a6f
SHA512f61a92c58d7da9dbd01580b4ef2370801205ce5293714ee3e4830c1c97eb1ddcd1c5ca9967ba1f7aa864840b8786ad5b690e944fa26e71e9d3def4d3004095bc