Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe
Resource
win10v2004-20220901-en
General
-
Target
f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe
-
Size
252KB
-
MD5
0bbe8a3ba95cb5bae8d9c910f447922b
-
SHA1
e470930a9edff095ef3ad8bd09cae6908b6128e9
-
SHA256
f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b
-
SHA512
81b1319b8d76ff997f8af2bb4ead9aa39f3149f75601fc1f4f69e624ae2f1c1c0b1f0abd067fdacffdc23d5bc8fc3b5e0bd77815dbf6e05eb63b7a10ec884fba
-
SSDEEP
3072:grAcsx7LaKsNvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKtjLw:grGCx/ZLA4PmG6dc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hmyeaz.exe -
Executes dropped EXE 1 IoCs
pid Process 3640 hmyeaz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /t" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /G" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /V" f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /v" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /i" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /O" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /W" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /m" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /h" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /c" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /Z" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /B" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /f" hmyeaz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /e" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /F" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /M" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /R" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /A" hmyeaz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /C" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /K" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /E" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /L" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /u" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /x" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /d" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /J" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /Q" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /a" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /P" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /s" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /q" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /I" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /T" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /b" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /o" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /H" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /j" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /D" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /z" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /N" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /S" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /X" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /k" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /Y" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /U" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /n" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /V" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /r" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /p" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /y" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /l" hmyeaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hmyeaz = "C:\\Users\\Admin\\hmyeaz.exe /g" hmyeaz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe 4796 f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe 3640 hmyeaz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4796 f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe 3640 hmyeaz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3640 4796 f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe 83 PID 4796 wrote to memory of 3640 4796 f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe 83 PID 4796 wrote to memory of 3640 4796 f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe"C:\Users\Admin\AppData\Local\Temp\f2204672091c4567e6292f205474ece098febef6a0628e4ffc09d6a32156f08b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\hmyeaz.exe"C:\Users\Admin\hmyeaz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD530b64f54c089843c78b486286ca2cd66
SHA1ec339f5de715fa9ecd1fdd94e8968166934cf1dd
SHA256f270de1b3b39e01d5414f9c1a95a10ae6012f01ff72e19082fe7ce28ff182bda
SHA512aef8aa5f35768c2bb773903a6f2a2afb414330b2977803502bdc83a757467039b84ede972f128e2557d49b73b28c7d194510c19960b15b6d6d5e03f72e9cfd5d
-
Filesize
252KB
MD530b64f54c089843c78b486286ca2cd66
SHA1ec339f5de715fa9ecd1fdd94e8968166934cf1dd
SHA256f270de1b3b39e01d5414f9c1a95a10ae6012f01ff72e19082fe7ce28ff182bda
SHA512aef8aa5f35768c2bb773903a6f2a2afb414330b2977803502bdc83a757467039b84ede972f128e2557d49b73b28c7d194510c19960b15b6d6d5e03f72e9cfd5d