Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 19:12
Static task
static1
Behavioral task
behavioral1
Sample
c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe
Resource
win10v2004-20220812-en
General
-
Target
c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe
-
Size
248KB
-
MD5
81a4278f7b4f2f52afec5958c81df1b2
-
SHA1
a9acdff83f0741d56be8d16e84a87711b5d5328e
-
SHA256
c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909
-
SHA512
3346a76f945a5abf0548f0154597e31e827ad79f9f59890dbeba6a6fdcdb6e7a85a6c1097911d3a06a1729b986b5922416effdbff33b70d7eb7f01933d1a3a79
-
SSDEEP
1536:jgUTCIP+MZH9Oj0IaxamasaXaq4noBU66yVZxrkEhq7:oI2f0n7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waigef.exe -
Executes dropped EXE 1 IoCs
pid Process 1552 waigef.exe -
Loads dropped DLL 2 IoCs
pid Process 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /M" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /F" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /C" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /H" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /O" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /p" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /X" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /r" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /Z" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /B" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /d" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /U" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /h" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /t" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /Q" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /e" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /T" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /n" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /u" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /l" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /k" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /i" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /g" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /G" waigef.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /J" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /v" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /W" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /K" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /I" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /E" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /P" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /z" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /S" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /V" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /c" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /f" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /b" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /R" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /x" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /q" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /D" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /Y" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /w" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /m" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /N" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /j" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /A" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /a" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /L" waigef.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\waigef = "C:\\Users\\Admin\\waigef.exe /y" waigef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe 1552 waigef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe 1552 waigef.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1552 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe 27 PID 1672 wrote to memory of 1552 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe 27 PID 1672 wrote to memory of 1552 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe 27 PID 1672 wrote to memory of 1552 1672 c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe 27 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26 PID 1552 wrote to memory of 1672 1552 waigef.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe"C:\Users\Admin\AppData\Local\Temp\c799e77e276acf93cc8284b2ba1b68e39231dd4805fe2f2187d75e04df0c0909.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\waigef.exe"C:\Users\Admin\waigef.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD571f596558a4311bc705751ec31df000b
SHA18aa04bf643747319fbde7b34e9227905e9be6803
SHA256ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133
SHA512f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0
-
Filesize
248KB
MD571f596558a4311bc705751ec31df000b
SHA18aa04bf643747319fbde7b34e9227905e9be6803
SHA256ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133
SHA512f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0
-
Filesize
248KB
MD571f596558a4311bc705751ec31df000b
SHA18aa04bf643747319fbde7b34e9227905e9be6803
SHA256ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133
SHA512f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0
-
Filesize
248KB
MD571f596558a4311bc705751ec31df000b
SHA18aa04bf643747319fbde7b34e9227905e9be6803
SHA256ed63dd1eb29e27f6aac484f4fc23d71e41301e3035ead94099d352e27ed80133
SHA512f9c362fa7b51b9843737e5cf5ae7b7cbc5c232f706ff8f1fd07f5fbd3a3b3447c485d86817ace9d0ba995dc0cc2d824505d9d84f3bbeb3b637d2b3433fbff9e0