Analysis
-
max time kernel
151s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 22:12
Static task
static1
Behavioral task
behavioral1
Sample
f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe
Resource
win10v2004-20220812-en
General
-
Target
f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe
-
Size
212KB
-
MD5
47730daf6383efe2e7fb42120d35e419
-
SHA1
00b136c08ecd00e2e2d17ae622cda904e0fccc9a
-
SHA256
f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8
-
SHA512
46bec11d2b24c2f9844e9160b1516006a9f67c2c9a7629b8312903702f1be3dbfc7627a6d8ca2787a66547080be2c543e873e5bcd31652a4be1cb96544514476
-
SSDEEP
6144:4CKlFwzWQyO8J0bqihew3b7KvfCBnn78MDxG6oRKnvmb7/D26NhHmpfXJNRYK:nKlFwb8J0egew3bevfY78MDxG6oRKnvP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sievuas.exe -
Executes dropped EXE 1 IoCs
pid Process 1420 sievuas.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /h" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /B" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /K" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /T" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /F" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /t" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /G" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /j" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /z" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /e" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /n" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /B" f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /Q" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /V" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /N" sievuas.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /I" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /i" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /A" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /S" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /M" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /k" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /w" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /W" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /Z" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /P" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /q" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /c" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /R" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /O" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /u" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /C" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /E" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /d" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /f" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /o" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /x" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /D" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /g" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /Y" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /J" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /H" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /m" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /y" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /l" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /v" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /X" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /p" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /U" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /s" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /a" sievuas.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /r" sievuas.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sievuas = "C:\\Users\\Admin\\sievuas.exe /L" sievuas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe 1420 sievuas.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 1420 sievuas.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1420 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 28 PID 1916 wrote to memory of 1420 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 28 PID 1916 wrote to memory of 1420 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 28 PID 1916 wrote to memory of 1420 1916 f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe"C:\Users\Admin\AppData\Local\Temp\f2a7a9703a21528d2344e988a27b3f3fea1ab9441b0a9d79610967a10f8140c8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\sievuas.exe"C:\Users\Admin\sievuas.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5702c2a2f0d92a2514d1dedf105bd3c26
SHA168809b90c287744c10c5d8341495be9e8d0d2aa9
SHA2561f76ace93fcd38d92fbc50cc11e9856213cb06baaf76fb78a02a76521fbdd6db
SHA51210f42f3c5b35666621221eb12b86863891a42657545d65c86e8d4868d73557d3f5a8038c44eeaef49983a68757a29d3c8572b7f08ecbf024ec0fb16c00f1f2a9
-
Filesize
212KB
MD5702c2a2f0d92a2514d1dedf105bd3c26
SHA168809b90c287744c10c5d8341495be9e8d0d2aa9
SHA2561f76ace93fcd38d92fbc50cc11e9856213cb06baaf76fb78a02a76521fbdd6db
SHA51210f42f3c5b35666621221eb12b86863891a42657545d65c86e8d4868d73557d3f5a8038c44eeaef49983a68757a29d3c8572b7f08ecbf024ec0fb16c00f1f2a9
-
Filesize
212KB
MD5702c2a2f0d92a2514d1dedf105bd3c26
SHA168809b90c287744c10c5d8341495be9e8d0d2aa9
SHA2561f76ace93fcd38d92fbc50cc11e9856213cb06baaf76fb78a02a76521fbdd6db
SHA51210f42f3c5b35666621221eb12b86863891a42657545d65c86e8d4868d73557d3f5a8038c44eeaef49983a68757a29d3c8572b7f08ecbf024ec0fb16c00f1f2a9
-
Filesize
212KB
MD5702c2a2f0d92a2514d1dedf105bd3c26
SHA168809b90c287744c10c5d8341495be9e8d0d2aa9
SHA2561f76ace93fcd38d92fbc50cc11e9856213cb06baaf76fb78a02a76521fbdd6db
SHA51210f42f3c5b35666621221eb12b86863891a42657545d65c86e8d4868d73557d3f5a8038c44eeaef49983a68757a29d3c8572b7f08ecbf024ec0fb16c00f1f2a9