Analysis
-
max time kernel
152s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe
Resource
win10v2004-20220812-en
General
-
Target
c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe
-
Size
132KB
-
MD5
5bf5c781281a532382c3971967bd6480
-
SHA1
d5605412edd0483aa458f932a0ae061f2b888110
-
SHA256
c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f
-
SHA512
6189ce6ed4b96dea30dbbc03fe631976e3fffdf04b48c5bac941ad3505f0215e6978c44f2fe6d0e8f3cb28a178d72c0127e0d49bb3bcb3b543ca496e1e2fd1c6
-
SSDEEP
1536:GPhvr9fufieh6hC3KwTHlyHcw1rqVjSxakAyBGecJ5J6:ihTluqehWwTHlyHBQNSxCJ6
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" coaeder.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 coaeder.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /h" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /d" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /x" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /c" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /r" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /u" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /w" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /f" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /v" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /a" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /b" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /e" coaeder.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /t" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /z" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /g" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /y" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /i" coaeder.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /o" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /m" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /j" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /p" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /i" c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /l" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /k" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /q" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /n" coaeder.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\coaeder = "C:\\Users\\Admin\\coaeder.exe /s" coaeder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe 2036 coaeder.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 2036 coaeder.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2036 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 27 PID 1228 wrote to memory of 2036 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 27 PID 1228 wrote to memory of 2036 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 27 PID 1228 wrote to memory of 2036 1228 c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe"C:\Users\Admin\AppData\Local\Temp\c11b3e645b4943313a5824183f999c55589124a70eb0cb6fc3af4965be4f505f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\coaeder.exe"C:\Users\Admin\coaeder.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD54957e4dc20f4f83bcb637a1dd89e88ab
SHA1f46efe10e1a2f1e99dd82791671b30cabe2898fb
SHA256f9ab01cee4e171265e89cbd75f149e0d22711a553694e5f04298a98132524cbb
SHA512cfa4a418cccbb29c62067d900e4e303c6d7e7b333c68849f42347ca9b07a37f93cf67ebd4fb744030d64f6e74f2832f249d86cdf6a22da9caee604d5d46d0014
-
Filesize
132KB
MD54957e4dc20f4f83bcb637a1dd89e88ab
SHA1f46efe10e1a2f1e99dd82791671b30cabe2898fb
SHA256f9ab01cee4e171265e89cbd75f149e0d22711a553694e5f04298a98132524cbb
SHA512cfa4a418cccbb29c62067d900e4e303c6d7e7b333c68849f42347ca9b07a37f93cf67ebd4fb744030d64f6e74f2832f249d86cdf6a22da9caee604d5d46d0014
-
Filesize
132KB
MD54957e4dc20f4f83bcb637a1dd89e88ab
SHA1f46efe10e1a2f1e99dd82791671b30cabe2898fb
SHA256f9ab01cee4e171265e89cbd75f149e0d22711a553694e5f04298a98132524cbb
SHA512cfa4a418cccbb29c62067d900e4e303c6d7e7b333c68849f42347ca9b07a37f93cf67ebd4fb744030d64f6e74f2832f249d86cdf6a22da9caee604d5d46d0014
-
Filesize
132KB
MD54957e4dc20f4f83bcb637a1dd89e88ab
SHA1f46efe10e1a2f1e99dd82791671b30cabe2898fb
SHA256f9ab01cee4e171265e89cbd75f149e0d22711a553694e5f04298a98132524cbb
SHA512cfa4a418cccbb29c62067d900e4e303c6d7e7b333c68849f42347ca9b07a37f93cf67ebd4fb744030d64f6e74f2832f249d86cdf6a22da9caee604d5d46d0014