Analysis
-
max time kernel
161s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe
Resource
win10v2004-20220812-en
General
-
Target
fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe
-
Size
116KB
-
MD5
a288466018cee60591577b50f8c23070
-
SHA1
5952e02a89ab352fd4e5c1d7be04bc65a1966119
-
SHA256
fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3
-
SHA512
9f2b24b7b9e93e117a73461f49a7a2919c41fff00bc62460a9ba5a13a4f424be958c70d3c23b3ae2b068c4f0d0255a0dc82ec66bc441ea1db6c5836fa0834421
-
SSDEEP
1536:w1pxoa++tv8Kw6KBOIW4Z8HO1Zwt0f4HeDUEdMOPy9sbgNLwo7JaSi:wp6+tvfIr1ZNDUEdawQU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tddoeq.exe -
Executes dropped EXE 1 IoCs
pid Process 1868 tddoeq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /Q" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /v" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /a" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /I" tddoeq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /J" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /x" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /d" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /w" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /q" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /v" fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /K" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /m" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /i" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /V" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /G" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /R" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /A" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /F" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /k" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /s" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /l" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /P" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /L" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /E" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /f" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /r" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /y" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /Z" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /N" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /D" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /u" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /S" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /z" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /e" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /U" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /j" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /X" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /g" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /Y" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /b" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /W" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /t" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /M" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /O" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /o" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /p" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /n" tddoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tddoeq = "C:\\Users\\Admin\\tddoeq.exe /c" tddoeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1236 fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe 1236 fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe 1868 tddoeq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1236 fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe 1868 tddoeq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1868 1236 fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe 83 PID 1236 wrote to memory of 1868 1236 fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe 83 PID 1236 wrote to memory of 1868 1236 fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe"C:\Users\Admin\AppData\Local\Temp\fd36e4ef40c0091e1eacd6c63861617f3476f6f04d217500f743c211c7b0b0e3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\tddoeq.exe"C:\Users\Admin\tddoeq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD58feeef88cfd05e88918184163ff98137
SHA1b46fc7ff73ea4a88f7e64dd2739b2b225eb5ba36
SHA256e84dc0d6fd7dc26bede4fa65f35b667b46b42e24e672d0d0f8f4e1945cc45e08
SHA512afc37e0d1d457d96e3e4fd016fd17e143d7f8130a125d900172894ab3efa82d564d3547da7330e806ad5a147b36e52b3ec3f2aa05643f07d2e9b11aaf125a240
-
Filesize
116KB
MD58feeef88cfd05e88918184163ff98137
SHA1b46fc7ff73ea4a88f7e64dd2739b2b225eb5ba36
SHA256e84dc0d6fd7dc26bede4fa65f35b667b46b42e24e672d0d0f8f4e1945cc45e08
SHA512afc37e0d1d457d96e3e4fd016fd17e143d7f8130a125d900172894ab3efa82d564d3547da7330e806ad5a147b36e52b3ec3f2aa05643f07d2e9b11aaf125a240