Analysis
-
max time kernel
150s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe
Resource
win10v2004-20220901-en
General
-
Target
12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe
-
Size
288KB
-
MD5
9284af880ac3f1351aaa123cb4ffc5dc
-
SHA1
41ad7fab5fb6b967a0122aed163a01a557286761
-
SHA256
12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39
-
SHA512
1a83f591bafa074c3af96b451712979beb73aa58c31432b82f0efc8d32e32a7f3a2582d9678e992a71d5db7349cc14f10a49949b3739c0a4404553d23ac47d24
-
SSDEEP
6144:4/iJTAN+tytpx96Hg02BCh3FZuhbYaxUG2nIVKUut3:4/iJTfyDxsHg02BCh3FZuhbYaxUG2nB/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaequen.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 kaequen.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /l" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /b" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /O" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /Z" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /e" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /W" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /V" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /R" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /s" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /y" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /w" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /H" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /L" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /N" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /G" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /C" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /Q" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /U" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /d" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /A" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /B" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /Y" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /k" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /q" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /D" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /S" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /x" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /P" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /T" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /c" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /u" kaequen.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /E" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /J" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /g" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /K" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /X" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /z" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /p" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /n" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /r" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /S" 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /m" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /f" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /I" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /j" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /h" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /t" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /a" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /o" kaequen.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaequen = "C:\\Users\\Admin\\kaequen.exe /v" kaequen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe 1652 kaequen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 1652 kaequen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1652 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 27 PID 2036 wrote to memory of 1652 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 27 PID 2036 wrote to memory of 1652 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 27 PID 2036 wrote to memory of 1652 2036 12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe"C:\Users\Admin\AppData\Local\Temp\12964c4fe9d9955533b823af838535535368d5e5d84952854ade666adc1cdf39.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\kaequen.exe"C:\Users\Admin\kaequen.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5a6a3cb091683ba1e7292dff67fad5a91
SHA17906bae2fbcd41a13d3cef9f5f44e071b271d0a8
SHA25676606ba69f9f7a1b6ba6801519d5bbd0fa56dfabdf19382b4946c6f50ca85e1c
SHA5122e2c5859333defbce16cdc06bd72038a6ccfa7ad33bd4308fa8c96e240b9349855b9dcac034d1e5be328202c549ef94296ed97a3304469335335c79900827b27
-
Filesize
288KB
MD5a6a3cb091683ba1e7292dff67fad5a91
SHA17906bae2fbcd41a13d3cef9f5f44e071b271d0a8
SHA25676606ba69f9f7a1b6ba6801519d5bbd0fa56dfabdf19382b4946c6f50ca85e1c
SHA5122e2c5859333defbce16cdc06bd72038a6ccfa7ad33bd4308fa8c96e240b9349855b9dcac034d1e5be328202c549ef94296ed97a3304469335335c79900827b27
-
Filesize
288KB
MD5a6a3cb091683ba1e7292dff67fad5a91
SHA17906bae2fbcd41a13d3cef9f5f44e071b271d0a8
SHA25676606ba69f9f7a1b6ba6801519d5bbd0fa56dfabdf19382b4946c6f50ca85e1c
SHA5122e2c5859333defbce16cdc06bd72038a6ccfa7ad33bd4308fa8c96e240b9349855b9dcac034d1e5be328202c549ef94296ed97a3304469335335c79900827b27
-
Filesize
288KB
MD5a6a3cb091683ba1e7292dff67fad5a91
SHA17906bae2fbcd41a13d3cef9f5f44e071b271d0a8
SHA25676606ba69f9f7a1b6ba6801519d5bbd0fa56dfabdf19382b4946c6f50ca85e1c
SHA5122e2c5859333defbce16cdc06bd72038a6ccfa7ad33bd4308fa8c96e240b9349855b9dcac034d1e5be328202c549ef94296ed97a3304469335335c79900827b27