Analysis
-
max time kernel
194s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe
Resource
win10v2004-20220812-en
General
-
Target
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe
-
Size
224KB
-
MD5
96f45c6ffe73af344dae68a42a2719cf
-
SHA1
9890323dfd5a0f0418c6bcf5da6f8d0f732d92ef
-
SHA256
d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f
-
SHA512
d2e2785b36b29ff5e869bde7d515c7d126b766e0e8aea50bc5692cf876624a56902750577d5496d793df8dac361e0f258501a19fda89397c319a7ba27bbc3cd7
-
SSDEEP
3072:o0b3N87hBQlAZV7l2mclfj4Uvx+9sNxu+2eRcKgsU61JkkX39RLrw4ySKUbax2+n:BNXG74L76nrZ3X
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biegi.exe -
Executes dropped EXE 1 IoCs
pid Process 1288 biegi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /y" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /i" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /v" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /n" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /m" biegi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /w" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /k" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /f" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /q" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /a" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /u" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /r" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /l" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /s" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /d" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /c" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /j" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /w" d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /h" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /e" biegi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /x" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /p" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /g" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /b" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /t" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /o" biegi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biegi = "C:\\Users\\Admin\\biegi.exe /z" biegi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4332 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 4332 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe 1288 biegi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4332 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 1288 biegi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1288 4332 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 82 PID 4332 wrote to memory of 1288 4332 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 82 PID 4332 wrote to memory of 1288 4332 d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe"C:\Users\Admin\AppData\Local\Temp\d3e2422d66e18a9988ec5f4dadb22e3fa32e744eff257dcaadd396dfea87a28f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\biegi.exe"C:\Users\Admin\biegi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD593dd8810c9ff42637ce2bbe50b62f15d
SHA16360bad03b79bff8ee898bb28ca5d6e54d1cb4ee
SHA256aa820af2e04b64b2d4ebdeddf83e75e0be4731f6213ab1aac71d68bc95208f37
SHA5123fbb5597cece1c9d13005da58ce23efbc225467b88f8d6a85af500d99efe2b8be7148a2bef2976da46e1e6541abcdce2de8c88c73a9eab135389adca9d0bc474
-
Filesize
224KB
MD593dd8810c9ff42637ce2bbe50b62f15d
SHA16360bad03b79bff8ee898bb28ca5d6e54d1cb4ee
SHA256aa820af2e04b64b2d4ebdeddf83e75e0be4731f6213ab1aac71d68bc95208f37
SHA5123fbb5597cece1c9d13005da58ce23efbc225467b88f8d6a85af500d99efe2b8be7148a2bef2976da46e1e6541abcdce2de8c88c73a9eab135389adca9d0bc474