Analysis
-
max time kernel
150s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 03:30
Static task
static1
Behavioral task
behavioral1
Sample
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
Resource
win10v2004-20220812-en
General
-
Target
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe
-
Size
348KB
-
MD5
2287ea0569ff4c181a0050da1a33595b
-
SHA1
89eb589364d84823cd0cab91e7251eadec97e8e7
-
SHA256
d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3
-
SHA512
e0614cde0270bcb2661993e216d6f9c5ce0454b49b170d415e7e167335a0ff9510f121dc97d28b040828b36c50ca95aaf574ea963e5457c8c799d4af5bb89f3f
-
SSDEEP
3072:ECXTo/0Yxyk0tQ9nLHbB9WPliBs2HWWEakGJm9cFso:ECusk4QxL7B9WPli+yWWEazH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saeej.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 saeej.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /q" d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /l" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /g" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /e" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /s" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /c" saeej.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /i" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /b" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /z" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /p" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /u" saeej.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /a" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /h" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /d" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /j" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /f" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /x" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /v" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /m" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /k" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /q" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /o" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /w" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /t" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /r" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /y" saeej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\saeej = "C:\\Users\\Admin\\saeej.exe /n" saeej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe 1728 saeej.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 1728 saeej.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1728 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 27 PID 1832 wrote to memory of 1728 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 27 PID 1832 wrote to memory of 1728 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 27 PID 1832 wrote to memory of 1728 1832 d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe"C:\Users\Admin\AppData\Local\Temp\d88c9fdff3af3895431fe8b671e706525e78fdff58e7d3c5b7b9af126a6db0a3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\saeej.exe"C:\Users\Admin\saeej.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD56a63fb1f5dae22a672f97cc260e463c5
SHA1eb45b943af83f76dfa94032925817af70ba6178f
SHA2566c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86
SHA5126028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1
-
Filesize
348KB
MD56a63fb1f5dae22a672f97cc260e463c5
SHA1eb45b943af83f76dfa94032925817af70ba6178f
SHA2566c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86
SHA5126028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1
-
Filesize
348KB
MD56a63fb1f5dae22a672f97cc260e463c5
SHA1eb45b943af83f76dfa94032925817af70ba6178f
SHA2566c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86
SHA5126028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1
-
Filesize
348KB
MD56a63fb1f5dae22a672f97cc260e463c5
SHA1eb45b943af83f76dfa94032925817af70ba6178f
SHA2566c1d5e45e777075f7afcff6820d0961f2f9dbc6f86337932b48543b678f2bb86
SHA5126028f95292ab2b0358aa27e3b00c2363a6be12eecd74b400295b23cfe3c0e3bf393afe67ad53ee6e04bb392e9a3c99121f3c96eeb3afcdcf27b56258e5c7a9f1