Analysis
-
max time kernel
151s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 00:04
Static task
static1
Behavioral task
behavioral1
Sample
3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe
Resource
win10v2004-20220812-en
General
-
Target
3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe
-
Size
60KB
-
MD5
a26b60b6a12b9fdab754447c30bb2720
-
SHA1
4ba29302fe635b961ec160a1ebc175793484e2a7
-
SHA256
3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393
-
SHA512
9bcae91d8e1dc789c3bf2f2dbfc72fc38c72a4d2a09038c972d802f393c77c57f0374614965c0bf217a0680d0269555da8bbae620d8992ade5df025087101468
-
SSDEEP
768:BQefh+S2YZtTIZb05Lm3dSUMUWMUX2TtFIkNcSFIkid+69KOeM1gYn6cg4gspB6:5h+S2YnZKkQ1WlkSeTZNMmJ0CwJW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maaezab.exe -
Executes dropped EXE 1 IoCs
pid Process 3100 maaezab.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /P" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /p" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /h" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /K" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /O" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /M" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /n" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /u" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /W" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /H" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /L" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /g" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /G" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /F" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /X" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /s" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /k" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /S" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /x" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /a" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /j" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /o" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /V" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /m" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /A" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /e" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /Y" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /q" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /I" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /w" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /y" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /J" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /f" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /b" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /Q" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /r" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /R" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /D" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /Z" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /d" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /t" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /l" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /B" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /E" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /c" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /v" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /C" maaezab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maaezab = "C:\\Users\\Admin\\maaezab.exe /U" maaezab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe 3100 maaezab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 876 3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe 3100 maaezab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 876 wrote to memory of 3100 876 3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe 82 PID 876 wrote to memory of 3100 876 3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe 82 PID 876 wrote to memory of 3100 876 3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe 82 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80 PID 3100 wrote to memory of 876 3100 maaezab.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe"C:\Users\Admin\AppData\Local\Temp\3fa62e45125ec4c58b4fe8d2160ae7769d910fcc0a4dd8db2f1338bdd5f5e393.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\maaezab.exe"C:\Users\Admin\maaezab.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b0051015d6e41ba2dfba29cf510c3241
SHA110435b9594ff816e63afb431711b5db24bcebed2
SHA2560622b181d5c43710bf44c5efb4fcd7643d8aa00ae4f52d6104f5012ffdcab9f2
SHA512743a6193bb5589a461882eda5d670b9139246835b6e5b3961fe85e817cc5f9b64692860b4139313c1a38ee3a1fbfa47abbbc82d42148127baa4cf790cd8ee51d
-
Filesize
60KB
MD5b0051015d6e41ba2dfba29cf510c3241
SHA110435b9594ff816e63afb431711b5db24bcebed2
SHA2560622b181d5c43710bf44c5efb4fcd7643d8aa00ae4f52d6104f5012ffdcab9f2
SHA512743a6193bb5589a461882eda5d670b9139246835b6e5b3961fe85e817cc5f9b64692860b4139313c1a38ee3a1fbfa47abbbc82d42148127baa4cf790cd8ee51d