Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe
Resource
win10v2004-20220812-en
General
-
Target
50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe
-
Size
156KB
-
MD5
1603f71194c42bf9164e710c9ae87eaa
-
SHA1
cfadb954fb3a2934d2bc8ac4f803127ff8d1fa3c
-
SHA256
50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7
-
SHA512
f630f7de00f921663c59ba6f7e967ee65ac7822bcaeb77ee8085975ba7c9f0f8a6a172ce83a4af40733bcb3dcf668fdbac5110ae0a8ec58d9fd63e795be9d816
-
SSDEEP
3072:gLySHYWrO0VctCPmJIHE+gRyRSIuznLstk4oQZiEStlF:TPGPctCrEaRQLpWMv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hktiz.exe -
Executes dropped EXE 1 IoCs
pid Process 1304 hktiz.exe -
Loads dropped DLL 2 IoCs
pid Process 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /u" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /L" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /M" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /T" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /T" 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /Y" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /V" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /B" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /K" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /t" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /X" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /w" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /H" hktiz.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /h" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /r" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /A" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /N" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /v" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /a" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /S" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /J" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /b" hktiz.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /c" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /l" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /z" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /d" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /C" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /y" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /e" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /j" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /Q" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /s" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /P" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /F" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /D" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /U" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /p" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /g" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /Z" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /q" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /k" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /o" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /E" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /W" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /I" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /G" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /i" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /m" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /O" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /n" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /f" hktiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\hktiz = "C:\\Users\\Admin\\hktiz.exe /R" hktiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe 1304 hktiz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 1304 hktiz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1304 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 27 PID 1328 wrote to memory of 1304 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 27 PID 1328 wrote to memory of 1304 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 27 PID 1328 wrote to memory of 1304 1328 50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe"C:\Users\Admin\AppData\Local\Temp\50c29e5322fc718cb0b40b86ee1bf63b9fa0b434f8f996f6bcc1384ad39f4de7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\hktiz.exe"C:\Users\Admin\hktiz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5fe50ebf9405d4d719aa7ce78471649d4
SHA1c15ad70bf5f066193659cf80997045de42edd36c
SHA256939192637a5b5cbb4e6b39bbcda0923549d9983df029f22b3bd7d35152de6105
SHA512610a45dd929c84bd56009e4e7a7ecc31a943c2f6dfb8c47cebb8027c4c7281a9109d71f1cd3bd4469fae6f8a17fb9eaa87548ddf7e401196eedb7032ea67375d
-
Filesize
156KB
MD5fe50ebf9405d4d719aa7ce78471649d4
SHA1c15ad70bf5f066193659cf80997045de42edd36c
SHA256939192637a5b5cbb4e6b39bbcda0923549d9983df029f22b3bd7d35152de6105
SHA512610a45dd929c84bd56009e4e7a7ecc31a943c2f6dfb8c47cebb8027c4c7281a9109d71f1cd3bd4469fae6f8a17fb9eaa87548ddf7e401196eedb7032ea67375d
-
Filesize
156KB
MD5fe50ebf9405d4d719aa7ce78471649d4
SHA1c15ad70bf5f066193659cf80997045de42edd36c
SHA256939192637a5b5cbb4e6b39bbcda0923549d9983df029f22b3bd7d35152de6105
SHA512610a45dd929c84bd56009e4e7a7ecc31a943c2f6dfb8c47cebb8027c4c7281a9109d71f1cd3bd4469fae6f8a17fb9eaa87548ddf7e401196eedb7032ea67375d
-
Filesize
156KB
MD5fe50ebf9405d4d719aa7ce78471649d4
SHA1c15ad70bf5f066193659cf80997045de42edd36c
SHA256939192637a5b5cbb4e6b39bbcda0923549d9983df029f22b3bd7d35152de6105
SHA512610a45dd929c84bd56009e4e7a7ecc31a943c2f6dfb8c47cebb8027c4c7281a9109d71f1cd3bd4469fae6f8a17fb9eaa87548ddf7e401196eedb7032ea67375d