Analysis
-
max time kernel
153s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe
Resource
win10v2004-20220901-en
General
-
Target
d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe
-
Size
188KB
-
MD5
51775b5df29935a6b3d142ff888427f1
-
SHA1
85eaae53310476c7af03384d64351fdb918921f1
-
SHA256
d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84
-
SHA512
2ad9d0d7b8822b7330276cd2c291984ce10d1f9b4210ce6e2a181fb9fb0d081c443d870055fce5c52ec2f6a92952571e3df998f82f118359cefdeda458ab234c
-
SSDEEP
3072:QRTiIr8vJ04bhUbaxf2+j0wM2xvMNcpA0Z8F+f4aqosA:Qbr8vNb/6cO0CF+f4aqosA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" liioh.exe -
Executes dropped EXE 1 IoCs
pid Process 1440 liioh.exe -
Loads dropped DLL 2 IoCs
pid Process 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /u" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /t" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /e" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /o" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /f" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /j" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /z" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /q" liioh.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /y" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /n" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /d" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /s" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /m" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /g" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /c" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /x" liioh.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /l" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /a" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /b" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /r" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /v" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /p" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /d" d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /w" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /k" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /h" liioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\liioh = "C:\\Users\\Admin\\liioh.exe /i" liioh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe 1440 liioh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 1440 liioh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 896 wrote to memory of 1440 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 28 PID 896 wrote to memory of 1440 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 28 PID 896 wrote to memory of 1440 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 28 PID 896 wrote to memory of 1440 896 d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe"C:\Users\Admin\AppData\Local\Temp\d44899be4d34ae1afdcdfb39c605f08a5b480d6a16016cf35a8d1307e517ef84.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\liioh.exe"C:\Users\Admin\liioh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD516adf7ea2d465bfecc79e0e5c90c1bb8
SHA1fa243c14d110e0382311a21835f4249e892956ec
SHA25675bf76d85aeca8b54c55a0d9bdb673de98eadbed2d24a8254de3882df7ac5600
SHA5120b853af519dc1ce0b0a468ea12fdacae975e88fe3fbc5342acc632c3948a79ae5e58deede53c898720e810e6d8ea4bb51504da63c1f6a1f1cabe382858ef9237
-
Filesize
188KB
MD516adf7ea2d465bfecc79e0e5c90c1bb8
SHA1fa243c14d110e0382311a21835f4249e892956ec
SHA25675bf76d85aeca8b54c55a0d9bdb673de98eadbed2d24a8254de3882df7ac5600
SHA5120b853af519dc1ce0b0a468ea12fdacae975e88fe3fbc5342acc632c3948a79ae5e58deede53c898720e810e6d8ea4bb51504da63c1f6a1f1cabe382858ef9237
-
Filesize
188KB
MD516adf7ea2d465bfecc79e0e5c90c1bb8
SHA1fa243c14d110e0382311a21835f4249e892956ec
SHA25675bf76d85aeca8b54c55a0d9bdb673de98eadbed2d24a8254de3882df7ac5600
SHA5120b853af519dc1ce0b0a468ea12fdacae975e88fe3fbc5342acc632c3948a79ae5e58deede53c898720e810e6d8ea4bb51504da63c1f6a1f1cabe382858ef9237
-
Filesize
188KB
MD516adf7ea2d465bfecc79e0e5c90c1bb8
SHA1fa243c14d110e0382311a21835f4249e892956ec
SHA25675bf76d85aeca8b54c55a0d9bdb673de98eadbed2d24a8254de3882df7ac5600
SHA5120b853af519dc1ce0b0a468ea12fdacae975e88fe3fbc5342acc632c3948a79ae5e58deede53c898720e810e6d8ea4bb51504da63c1f6a1f1cabe382858ef9237