Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe
Resource
win10v2004-20220901-en
General
-
Target
db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe
-
Size
224KB
-
MD5
4aacb1b49ae99ef768f113e1d6ba2d4c
-
SHA1
96ae97c71a65fdb67dfbfd9d790233ca5458d408
-
SHA256
db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02
-
SHA512
014e7bd4aac89205e6b27727ea342b6011e251db94bc7cfe50c6c8f118908ada7c062c0d4028ed1a9220186a70d9e58ecf37355531537919d7af1d9242aacbf5
-
SSDEEP
3072:PXyqNsMoBuN3ZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2W:aqN5Jp4LnbmlrZ3y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neoije.exe -
Executes dropped EXE 1 IoCs
pid Process 996 neoije.exe -
Loads dropped DLL 2 IoCs
pid Process 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /g" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /b" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /l" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /o" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /x" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /i" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /k" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /z" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /p" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /r" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /s" neoije.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /n" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /v" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /u" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /c" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /m" neoije.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /m" db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /d" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /j" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /a" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /h" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /w" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /f" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /q" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /t" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /y" neoije.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\neoije = "C:\\Users\\Admin\\neoije.exe /e" neoije.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe 996 neoije.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 996 neoije.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 604 wrote to memory of 996 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 26 PID 604 wrote to memory of 996 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 26 PID 604 wrote to memory of 996 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 26 PID 604 wrote to memory of 996 604 db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe"C:\Users\Admin\AppData\Local\Temp\db6b0d18a0a06f9cd404b53823791e74f0dd2b90a3c51ac855421f8755de1c02.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\neoije.exe"C:\Users\Admin\neoije.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD51923a2ed7a2815cfa0536e996411d3d7
SHA14136665e9889e347cf168faceca491398b75a34f
SHA2568a524073436bf46ecb113d26d789eda35bbf3420b2bf59032f7c621eb45e4e8a
SHA512e820f3f66b22001395e0fd5dc87ac03f1609b9b96b9f61fc245f3dc2571d3dd497c9c4481a7f856e18981bb868a95f7f6799e0fe309973e3be43ad89b53d4943
-
Filesize
224KB
MD51923a2ed7a2815cfa0536e996411d3d7
SHA14136665e9889e347cf168faceca491398b75a34f
SHA2568a524073436bf46ecb113d26d789eda35bbf3420b2bf59032f7c621eb45e4e8a
SHA512e820f3f66b22001395e0fd5dc87ac03f1609b9b96b9f61fc245f3dc2571d3dd497c9c4481a7f856e18981bb868a95f7f6799e0fe309973e3be43ad89b53d4943
-
Filesize
224KB
MD51923a2ed7a2815cfa0536e996411d3d7
SHA14136665e9889e347cf168faceca491398b75a34f
SHA2568a524073436bf46ecb113d26d789eda35bbf3420b2bf59032f7c621eb45e4e8a
SHA512e820f3f66b22001395e0fd5dc87ac03f1609b9b96b9f61fc245f3dc2571d3dd497c9c4481a7f856e18981bb868a95f7f6799e0fe309973e3be43ad89b53d4943
-
Filesize
224KB
MD51923a2ed7a2815cfa0536e996411d3d7
SHA14136665e9889e347cf168faceca491398b75a34f
SHA2568a524073436bf46ecb113d26d789eda35bbf3420b2bf59032f7c621eb45e4e8a
SHA512e820f3f66b22001395e0fd5dc87ac03f1609b9b96b9f61fc245f3dc2571d3dd497c9c4481a7f856e18981bb868a95f7f6799e0fe309973e3be43ad89b53d4943