Analysis
-
max time kernel
174s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:19
Static task
static1
Behavioral task
behavioral1
Sample
5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe
Resource
win10v2004-20220901-en
General
-
Target
5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe
-
Size
104KB
-
MD5
9020a1a499e7a948be07af2ec92487cb
-
SHA1
5882d3e53a28c77f70aedc405ca89a3136f214c3
-
SHA256
5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2
-
SHA512
9b53b423192a62a1faa16f2a85383e80ea12d233bedb2cf2680d2a9f5ba94dfb2d942a31da4f9eaddaec735261522ebe6b6eda74c2d306eb35f71b440567fc81
-
SSDEEP
1536:MLF4nDfOnpgkiuIuQdooL6x9uGB+2LGUh5crgqIbflrUHXzIgp2zy9JhTHhNIjn7:9GwuQdbgOqIUrMzIgp2mJNhCn7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rtniaj.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 rtniaj.exe -
Loads dropped DLL 2 IoCs
pid Process 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /h" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /F" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /Q" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /U" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /D" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /n" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /c" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /Y" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /T" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /M" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /N" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /R" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /g" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /x" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /u" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /i" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /W" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /L" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /b" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /z" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /y" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /e" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /J" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /l" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /G" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /V" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /f" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /v" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /q" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /w" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /E" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /a" rtniaj.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /m" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /t" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /P" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /p" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /I" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /s" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /o" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /j" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /A" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /H" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /O" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /B" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /S" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /k" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /C" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /K" rtniaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\rtniaj = "C:\\Users\\Admin\\rtniaj.exe /b" 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rtniaj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe 1604 rtniaj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 1604 rtniaj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1604 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 28 PID 1808 wrote to memory of 1604 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 28 PID 1808 wrote to memory of 1604 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 28 PID 1808 wrote to memory of 1604 1808 5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe"C:\Users\Admin\AppData\Local\Temp\5df60547813721d33c33b7a6ae8a0ad8b617a6f7105bf77ee39ec19df652b2a2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\rtniaj.exe"C:\Users\Admin\rtniaj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD56ba831fb4c5eb95cf3c2931806afc304
SHA1008e1a815e50f32ef094289407657e82b036f777
SHA256203ba9470cbdfe0107e02968710aed5373f58a1b2e637300e42492e45fb96148
SHA51223723077233437e292420ae8b714620b0c10b0ce4dd2085332e628ad0566b48d8504b7cc9b6f0a9ec0785665a45ca38f63d43fa5fec9a58563aa47574f5fd15c
-
Filesize
104KB
MD56ba831fb4c5eb95cf3c2931806afc304
SHA1008e1a815e50f32ef094289407657e82b036f777
SHA256203ba9470cbdfe0107e02968710aed5373f58a1b2e637300e42492e45fb96148
SHA51223723077233437e292420ae8b714620b0c10b0ce4dd2085332e628ad0566b48d8504b7cc9b6f0a9ec0785665a45ca38f63d43fa5fec9a58563aa47574f5fd15c
-
Filesize
104KB
MD56ba831fb4c5eb95cf3c2931806afc304
SHA1008e1a815e50f32ef094289407657e82b036f777
SHA256203ba9470cbdfe0107e02968710aed5373f58a1b2e637300e42492e45fb96148
SHA51223723077233437e292420ae8b714620b0c10b0ce4dd2085332e628ad0566b48d8504b7cc9b6f0a9ec0785665a45ca38f63d43fa5fec9a58563aa47574f5fd15c
-
Filesize
104KB
MD56ba831fb4c5eb95cf3c2931806afc304
SHA1008e1a815e50f32ef094289407657e82b036f777
SHA256203ba9470cbdfe0107e02968710aed5373f58a1b2e637300e42492e45fb96148
SHA51223723077233437e292420ae8b714620b0c10b0ce4dd2085332e628ad0566b48d8504b7cc9b6f0a9ec0785665a45ca38f63d43fa5fec9a58563aa47574f5fd15c