Analysis
-
max time kernel
156s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe
Resource
win10v2004-20220812-en
General
-
Target
5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe
-
Size
246KB
-
MD5
a0b1198dd9480672e3a7598993c836c3
-
SHA1
dd04c59ad97ba62068d70264d8f495901f070e79
-
SHA256
5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6
-
SHA512
a5e0260a2d10151284c1e5a1300b516aa6775ea4fe0b1f0d9d6947535dc091197887fd2279ded5b8174afa3d5a88181eb3b87d0f1c46137cb6d746ab9e4c4400
-
SSDEEP
1536:X11D85ups/oQqI6vmJgGMct4V0FnYmy1DZeKNOct4V0FnYmy1DZeKN/:Mk3U6vh64VynBy1hO64VynBy1h/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maacia.exe -
Executes dropped EXE 1 IoCs
pid Process 4764 maacia.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /p" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /d" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /r" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /u" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /n" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /o" maacia.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /v" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /m" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /l" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /b" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /a" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /j" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /c" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /e" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /t" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /g" maacia.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /i" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /s" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /k" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /z" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /o" 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /h" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /q" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /y" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /f" maacia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maacia = "C:\\Users\\Admin\\maacia.exe /x" maacia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1388 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe 1388 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe 4764 maacia.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1388 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe 4764 maacia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 4764 1388 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe 81 PID 1388 wrote to memory of 4764 1388 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe 81 PID 1388 wrote to memory of 4764 1388 5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe"C:\Users\Admin\AppData\Local\Temp\5355b1efada3cbdf8fd9c2fa52f50569807fe4b473122bef6b981cec96c107c6.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\maacia.exe"C:\Users\Admin\maacia.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD55a66c77f582130d13f5ade0ac6076496
SHA1dd45d1ae0506d305f4e2adf1b250d8ded8df51e2
SHA2568182fe0b2dd29115211b210f2c97481f2f531c557db202463cf3f31d35eb2435
SHA512e840500590316ffd5c679b77262fa5603b6ae43724ff06a83fce8c33d24aa50c1bcc1f1a644263def64723e7141b9678908752e2bc6770aa3dae7782fd97dfe6
-
Filesize
246KB
MD55a66c77f582130d13f5ade0ac6076496
SHA1dd45d1ae0506d305f4e2adf1b250d8ded8df51e2
SHA2568182fe0b2dd29115211b210f2c97481f2f531c557db202463cf3f31d35eb2435
SHA512e840500590316ffd5c679b77262fa5603b6ae43724ff06a83fce8c33d24aa50c1bcc1f1a644263def64723e7141b9678908752e2bc6770aa3dae7782fd97dfe6