Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe
Resource
win10v2004-20220812-en
General
-
Target
df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe
-
Size
256KB
-
MD5
a0974491d06a1f058b1e3176724f5d32
-
SHA1
2b50fe4bb4df8247f3a5083c0f86f8424a63e03e
-
SHA256
df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84
-
SHA512
83bc0be99fe96b10109a0520db012c7fd6fcaab7baecadb0e7aad5b18f6699855e53d8f8e48ef0f0a79ce58dff64aea0139c9c5825766a14010296d33a17c0ce
-
SSDEEP
6144:BiGDh4jLt4NVcWgyGELwXiS8T+bbhn7aRjS5ZgXbG:AGWntWyD1LiS8lS5Zi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" laohok.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 laohok.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /k" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /P" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /r" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /K" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /c" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /n" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /U" laohok.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /b" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /T" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /L" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /O" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /a" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /m" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /S" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /g" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /J" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /z" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /x" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /Q" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /I" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /v" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /q" df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /N" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /h" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /f" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /G" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /q" laohok.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /R" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /p" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /E" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /Z" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /X" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /e" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /u" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /o" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /d" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /V" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /C" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /W" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /Y" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /A" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /w" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /M" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /B" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /D" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /i" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /H" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /s" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /F" laohok.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\laohok = "C:\\Users\\Admin\\laohok.exe /l" laohok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe 2020 laohok.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 2020 laohok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2020 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 26 PID 1988 wrote to memory of 2020 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 26 PID 1988 wrote to memory of 2020 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 26 PID 1988 wrote to memory of 2020 1988 df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe"C:\Users\Admin\AppData\Local\Temp\df7f924bc4e2b8c06c58c81bb3c787f065dadf17cacce9dc51c5432c8d3e7d84.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\laohok.exe"C:\Users\Admin\laohok.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD57757a93811db6dc903c8ffba17910107
SHA1e7c03cd3309aad8f7360ee4c841273e3a60e526c
SHA256cf00f8a5866154d90067fc755e201dbc7fe4aa1c7a49f5e7e0b398ab4ade7eca
SHA512b516cbcf1f5e7b29c837d1693fb3e0c7125f93cef6cf9e8e4971b6a1dfe43411813fd496d183401ae9bde611eed4e6a25184ef8de3e8736fb9b96470bc8c9a09
-
Filesize
256KB
MD57757a93811db6dc903c8ffba17910107
SHA1e7c03cd3309aad8f7360ee4c841273e3a60e526c
SHA256cf00f8a5866154d90067fc755e201dbc7fe4aa1c7a49f5e7e0b398ab4ade7eca
SHA512b516cbcf1f5e7b29c837d1693fb3e0c7125f93cef6cf9e8e4971b6a1dfe43411813fd496d183401ae9bde611eed4e6a25184ef8de3e8736fb9b96470bc8c9a09
-
Filesize
256KB
MD57757a93811db6dc903c8ffba17910107
SHA1e7c03cd3309aad8f7360ee4c841273e3a60e526c
SHA256cf00f8a5866154d90067fc755e201dbc7fe4aa1c7a49f5e7e0b398ab4ade7eca
SHA512b516cbcf1f5e7b29c837d1693fb3e0c7125f93cef6cf9e8e4971b6a1dfe43411813fd496d183401ae9bde611eed4e6a25184ef8de3e8736fb9b96470bc8c9a09
-
Filesize
256KB
MD57757a93811db6dc903c8ffba17910107
SHA1e7c03cd3309aad8f7360ee4c841273e3a60e526c
SHA256cf00f8a5866154d90067fc755e201dbc7fe4aa1c7a49f5e7e0b398ab4ade7eca
SHA512b516cbcf1f5e7b29c837d1693fb3e0c7125f93cef6cf9e8e4971b6a1dfe43411813fd496d183401ae9bde611eed4e6a25184ef8de3e8736fb9b96470bc8c9a09