Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe
Resource
win10v2004-20220812-en
General
-
Target
2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe
-
Size
84KB
-
MD5
91cd2ac7e102172f64c048396f88a620
-
SHA1
1b080d581c1a5a1a1923d8c2a1840b80a229a287
-
SHA256
2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f
-
SHA512
e043ba047925936248c1b440236c2810c04d8b2358f9bfe6cb9cb2330e4ca2619f6dd98011144de288330882f11615d33806567f956ef79f740a43c35ed83805
-
SSDEEP
1536:IsodgNE16Lti8n42APNR2dcScLcPcxeTanuUHWOIs3xxNMq39gk34iSf:/54PNEdcScLcPcfnuo0X
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caoir.exe -
Executes dropped EXE 1 IoCs
pid Process 4540 caoir.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /n" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /v" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /p" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /a" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /c" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /u" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /o" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /x" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /s" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /j" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /s" 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /d" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /h" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /y" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /g" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /w" caoir.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /b" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /r" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /k" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /e" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /i" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /f" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /z" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /t" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /q" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /l" caoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caoir = "C:\\Users\\Admin\\caoir.exe /m" caoir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe 4532 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe 4540 caoir.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4532 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe 4540 caoir.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4540 4532 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe 82 PID 4532 wrote to memory of 4540 4532 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe 82 PID 4532 wrote to memory of 4540 4532 2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe"C:\Users\Admin\AppData\Local\Temp\2a9f4ec5eb42901b5b6e1571b1273a9c54d57040be20965cda33a7653f282d0f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\caoir.exe"C:\Users\Admin\caoir.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5745fc469753ddea38d4ba8dc075ef07d
SHA19553c179774e8f0ccd2fbdee000bfd12dff36a52
SHA256fe6ee98964b777fd768324ed2f1850531b00fa57f11ac9f47c9256e2c7661448
SHA512a6ca3d9df69893905c755c03051f391d0d9adc8314468b6b45a73279678a5e83b81df54651d732ae25e67150680e2e87c8cd3391547d5c9e919473b3e1984902
-
Filesize
84KB
MD5745fc469753ddea38d4ba8dc075ef07d
SHA19553c179774e8f0ccd2fbdee000bfd12dff36a52
SHA256fe6ee98964b777fd768324ed2f1850531b00fa57f11ac9f47c9256e2c7661448
SHA512a6ca3d9df69893905c755c03051f391d0d9adc8314468b6b45a73279678a5e83b81df54651d732ae25e67150680e2e87c8cd3391547d5c9e919473b3e1984902