Analysis
-
max time kernel
152s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe
Resource
win10v2004-20220901-en
General
-
Target
b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe
-
Size
196KB
-
MD5
91511f3fd718c78945e25817282ddcb7
-
SHA1
b65ca5152f8ca571477eeceffe65a2c88077c5f8
-
SHA256
b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282
-
SHA512
7332f691072f6a1b54e73cd33f967b70ac2720da80e69243c9acf7f4a4089c23f017ab8c9a39063652ea0e76f8ab9b0e2f7826ec8382e902e980216beed0b413
-
SSDEEP
3072:Iy1WAgcN0tQ9nLHbB9WmvA7vejJWKvE+Kmntz:9p4QxL7B9WjjejJW5+9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiogoa.exe -
Executes dropped EXE 1 IoCs
pid Process 1452 wiogoa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /t" wiogoa.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /w" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /x" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /z" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /v" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /b" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /c" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /y" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /d" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /j" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /r" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /g" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /q" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /f" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /i" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /u" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /k" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /a" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /m" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /l" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /o" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /e" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /p" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /x" b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /s" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /n" wiogoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiogoa = "C:\\Users\\Admin\\wiogoa.exe /h" wiogoa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3928 b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe 3928 b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe 1452 wiogoa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3928 b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe 1452 wiogoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3928 wrote to memory of 1452 3928 b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe 83 PID 3928 wrote to memory of 1452 3928 b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe 83 PID 3928 wrote to memory of 1452 3928 b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe"C:\Users\Admin\AppData\Local\Temp\b03419fd41399402eaef60af9d2d2678a08dbd469006822ee50499473150b282.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\wiogoa.exe"C:\Users\Admin\wiogoa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5b4412b29c25f717cad4d4e68b4c6a1e5
SHA12562e5d506baaa87567e88ff597a309af394914b
SHA256910c599614b1f06a6c627911e6b6ad91ffc2d5cfd90d004292f5f6972fe86c1d
SHA51284897c590d3b2c505a05e3baab0028b7a90ab8a87f355b4b0bb3c8178b5e7bda7d4625cc9949b5e145df0c073f8d77aba2006104020c4332a87e7a6c70ea25a1
-
Filesize
196KB
MD5b4412b29c25f717cad4d4e68b4c6a1e5
SHA12562e5d506baaa87567e88ff597a309af394914b
SHA256910c599614b1f06a6c627911e6b6ad91ffc2d5cfd90d004292f5f6972fe86c1d
SHA51284897c590d3b2c505a05e3baab0028b7a90ab8a87f355b4b0bb3c8178b5e7bda7d4625cc9949b5e145df0c073f8d77aba2006104020c4332a87e7a6c70ea25a1