Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe
Resource
win10v2004-20220812-en
General
-
Target
8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe
-
Size
116KB
-
MD5
8022c477b7ec7bb7c1e41d5a39615220
-
SHA1
a5652f92cf43994628623314781d197542aad258
-
SHA256
8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38
-
SHA512
e2f12597e9d4cb62d5a86a648fa15380a781fbd77265997791d67fa25e30175a7dc16eefb86100e5e54793d3fe8f96f9912798eb6fc2dce5dfd047019e0ba32d
-
SSDEEP
1536:jyfwR85EfxX+s7hiCQV0YJJRNBI1cZA2SdzKDbpDmJwQnSmnA8owh7CzR5:jyfwAwX+ePQVpJ2mSAfIPSmA830
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rglix.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 rglix.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /D" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /L" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /W" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /I" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /l" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /x" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /t" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /O" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /v" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /G" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /Z" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /Y" rglix.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /A" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /H" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /M" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /m" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /R" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /d" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /K" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /r" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /o" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /i" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /T" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /u" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /h" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /j" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /P" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /F" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /U" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /C" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /S" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /s" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /p" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /S" 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /X" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /E" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /e" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /z" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /k" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /q" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /n" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /J" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /a" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /Q" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /V" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /B" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /w" rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /N" rglix.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rglix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rglix = "C:\\Users\\Admin\\rglix.exe /c" rglix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4240 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe 4240 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe 2168 rglix.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4240 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe 2168 rglix.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2168 4240 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe 83 PID 4240 wrote to memory of 2168 4240 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe 83 PID 4240 wrote to memory of 2168 4240 8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe"C:\Users\Admin\AppData\Local\Temp\8db25bf1f61759e5aa3a5708c45890d1c308479a42c5e0747c7b60468dc96e38.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\rglix.exe"C:\Users\Admin\rglix.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5d24ce721244068ca5d458ed9c7752c60
SHA198e4ba36bf260889f71dcb53bcfc86ec7e39e68d
SHA256fc119f1fced763ffdd7286ae80166be902b9ba1b3018dd819ac7f7634badf077
SHA5127acee614e4fe91d9fb6e761bae05d6ad06b57b6b380c9fa1a77861ee6a29b09d307af85f68fd5652c4abb931c0df93761709f90462f0cc4101f2e7e0eeea12bd
-
Filesize
116KB
MD5d24ce721244068ca5d458ed9c7752c60
SHA198e4ba36bf260889f71dcb53bcfc86ec7e39e68d
SHA256fc119f1fced763ffdd7286ae80166be902b9ba1b3018dd819ac7f7634badf077
SHA5127acee614e4fe91d9fb6e761bae05d6ad06b57b6b380c9fa1a77861ee6a29b09d307af85f68fd5652c4abb931c0df93761709f90462f0cc4101f2e7e0eeea12bd