Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe
Resource
win10v2004-20220901-en
General
-
Target
c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe
-
Size
224KB
-
MD5
0128cf936a8b37c874548a7e74798830
-
SHA1
43d4e494b6731b420b03a497b201c78f395f62d3
-
SHA256
c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b
-
SHA512
44aed777e3da471ee789326bf9da584c6c1bd1b5921c9670b443febc8939da7c3b75e62c55de87b7f5c0e80ad48fac0756e1a5fd3c0b60c532bf776b653b5de3
-
SSDEEP
3072:NXyqNsMoBuMZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2+l:0qN5Yp4LnbmlrZ3y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teoiz.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 teoiz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /x" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /c" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /l" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /f" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /t" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /k" teoiz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /y" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /n" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /s" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /p" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /w" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /h" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /z" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /d" c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /q" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /m" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /j" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /b" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /r" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /d" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /v" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /a" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /u" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /i" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /g" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /e" teoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoiz = "C:\\Users\\Admin\\teoiz.exe /o" teoiz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ teoiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3852 c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe 3852 c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe 2944 teoiz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3852 c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe 2944 teoiz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3852 wrote to memory of 2944 3852 c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe 89 PID 3852 wrote to memory of 2944 3852 c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe 89 PID 3852 wrote to memory of 2944 3852 c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe"C:\Users\Admin\AppData\Local\Temp\c71bb2926ffb97266a9f8ea83f2f5add3480bf1488d9e908c5ecccf1fbd4eb0b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\teoiz.exe"C:\Users\Admin\teoiz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD52f6516b46bef583912e7cead8e296e31
SHA11bd2649cc681788e9cdf866adf6df12aa9aa5ba2
SHA256c0585346e99bf521a00d1498e404f73ce151022bbf24a9ecd99eb275c333c514
SHA5129b32a09251000fd9a9126daad61748c49c99a03ed88c2fbb14ccd411f612848fadbc6e6c9da82d48cee056b0e54f42b44c9d84f6b317bb0f29993ac8ee8498f6
-
Filesize
224KB
MD52f6516b46bef583912e7cead8e296e31
SHA11bd2649cc681788e9cdf866adf6df12aa9aa5ba2
SHA256c0585346e99bf521a00d1498e404f73ce151022bbf24a9ecd99eb275c333c514
SHA5129b32a09251000fd9a9126daad61748c49c99a03ed88c2fbb14ccd411f612848fadbc6e6c9da82d48cee056b0e54f42b44c9d84f6b317bb0f29993ac8ee8498f6