Analysis
-
max time kernel
194s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe
Resource
win10v2004-20221111-en
General
-
Target
b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe
-
Size
993KB
-
MD5
6381d729b6ec6be756b66198d69f24e9
-
SHA1
933be56a1c8877911db3682210463515a6fd852f
-
SHA256
b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706
-
SHA512
4d9659bf1e9f2a25105c0fb0993102384f87257fa7be0400cb190a59ce1e340009c49f48a28439f0c5aedfba32ed4cbdba96761dad6dc29a35683ddbc1d96e30
-
SSDEEP
24576:Z4lavt0LkLL9IMixoEgeam6mE0V92Lqq9MmCS:okwkn9IMHeamD92eaPCS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
7080.exeokive.exepid process 1128 7080.exe 560 okive.exe -
Loads dropped DLL 6 IoCs
Processes:
b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe7080.exepid process 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 1128 7080.exe 1128 7080.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
okive.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\Currentversion\Run okive.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6E25AC10-DEE2-82D9-E34C-F755DE1477F6} = "C:\\Users\\Admin\\AppData\\Roaming\\Rauhsu\\okive.exe" okive.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7080.exedescription pid process target process PID 1128 set thread context of 1204 1128 7080.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
7080.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy 7080.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7080.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\18D22ADF-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
okive.exepid process 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe 560 okive.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7080.execmd.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1128 7080.exe Token: SeSecurityPrivilege 1128 7080.exe Token: SeSecurityPrivilege 1128 7080.exe Token: SeSecurityPrivilege 1204 cmd.exe Token: SeManageVolumePrivilege 428 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 428 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 428 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 428 WinMail.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe7080.exeokive.exedescription pid process target process PID 1200 wrote to memory of 1128 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 7080.exe PID 1200 wrote to memory of 1128 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 7080.exe PID 1200 wrote to memory of 1128 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 7080.exe PID 1200 wrote to memory of 1128 1200 b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe 7080.exe PID 1128 wrote to memory of 560 1128 7080.exe okive.exe PID 1128 wrote to memory of 560 1128 7080.exe okive.exe PID 1128 wrote to memory of 560 1128 7080.exe okive.exe PID 1128 wrote to memory of 560 1128 7080.exe okive.exe PID 560 wrote to memory of 1136 560 okive.exe taskhost.exe PID 560 wrote to memory of 1136 560 okive.exe taskhost.exe PID 560 wrote to memory of 1136 560 okive.exe taskhost.exe PID 560 wrote to memory of 1136 560 okive.exe taskhost.exe PID 560 wrote to memory of 1136 560 okive.exe taskhost.exe PID 560 wrote to memory of 1232 560 okive.exe Dwm.exe PID 560 wrote to memory of 1232 560 okive.exe Dwm.exe PID 560 wrote to memory of 1232 560 okive.exe Dwm.exe PID 560 wrote to memory of 1232 560 okive.exe Dwm.exe PID 560 wrote to memory of 1232 560 okive.exe Dwm.exe PID 560 wrote to memory of 1280 560 okive.exe Explorer.EXE PID 560 wrote to memory of 1280 560 okive.exe Explorer.EXE PID 560 wrote to memory of 1280 560 okive.exe Explorer.EXE PID 560 wrote to memory of 1280 560 okive.exe Explorer.EXE PID 560 wrote to memory of 1280 560 okive.exe Explorer.EXE PID 560 wrote to memory of 1128 560 okive.exe 7080.exe PID 560 wrote to memory of 1128 560 okive.exe 7080.exe PID 560 wrote to memory of 1128 560 okive.exe 7080.exe PID 560 wrote to memory of 1128 560 okive.exe 7080.exe PID 560 wrote to memory of 1128 560 okive.exe 7080.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 1128 wrote to memory of 1204 1128 7080.exe cmd.exe PID 560 wrote to memory of 992 560 okive.exe conhost.exe PID 560 wrote to memory of 992 560 okive.exe conhost.exe PID 560 wrote to memory of 992 560 okive.exe conhost.exe PID 560 wrote to memory of 992 560 okive.exe conhost.exe PID 560 wrote to memory of 992 560 okive.exe conhost.exe PID 560 wrote to memory of 428 560 okive.exe WinMail.exe PID 560 wrote to memory of 428 560 okive.exe WinMail.exe PID 560 wrote to memory of 428 560 okive.exe WinMail.exe PID 560 wrote to memory of 428 560 okive.exe WinMail.exe PID 560 wrote to memory of 428 560 okive.exe WinMail.exe PID 560 wrote to memory of 940 560 okive.exe DllHost.exe PID 560 wrote to memory of 940 560 okive.exe DllHost.exe PID 560 wrote to memory of 940 560 okive.exe DllHost.exe PID 560 wrote to memory of 940 560 okive.exe DllHost.exe PID 560 wrote to memory of 940 560 okive.exe DllHost.exe PID 560 wrote to memory of 1112 560 okive.exe DllHost.exe PID 560 wrote to memory of 1112 560 okive.exe DllHost.exe PID 560 wrote to memory of 1112 560 okive.exe DllHost.exe PID 560 wrote to memory of 1112 560 okive.exe DllHost.exe PID 560 wrote to memory of 1112 560 okive.exe DllHost.exe PID 560 wrote to memory of 1600 560 okive.exe DllHost.exe PID 560 wrote to memory of 1600 560 okive.exe DllHost.exe PID 560 wrote to memory of 1600 560 okive.exe DllHost.exe PID 560 wrote to memory of 1600 560 okive.exe DllHost.exe PID 560 wrote to memory of 1600 560 okive.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1136
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe"C:\Users\Admin\AppData\Local\Temp\b014cb83947fdbc1b51606e0adb970c9e1ae38ece393fbad764f954094958706.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\7080\7080.exe"C:\Users\Admin\AppData\Local\Temp\7080\7080.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\Rauhsu\okive.exe"C:\Users\Admin\AppData\Roaming\Rauhsu\okive.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp529130bf.bat"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1094030298-1377911286-1440344479-1567039614-632280441301718346-867927541441839619"1⤵PID:992
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:428
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:940
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1112
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5df8070d60eeaa2e11902c007ad07cd7c
SHA18bf0b0fe998dde2b9b084b46ff7ffed8e713004a
SHA256e5afd145922a4d52076a2ac7890a398130f858020d5037fe37893a30e44f7b5b
SHA5120b192a8c65270be93d28a21237aaf8900fb7f983c6b39838fd24b8861384414ab160fe8eabfeddf0f231e838d436186d3b45d6d372923a3a6814c12ff747e469
-
Filesize
138KB
MD5df8070d60eeaa2e11902c007ad07cd7c
SHA18bf0b0fe998dde2b9b084b46ff7ffed8e713004a
SHA256e5afd145922a4d52076a2ac7890a398130f858020d5037fe37893a30e44f7b5b
SHA5120b192a8c65270be93d28a21237aaf8900fb7f983c6b39838fd24b8861384414ab160fe8eabfeddf0f231e838d436186d3b45d6d372923a3a6814c12ff747e469
-
Filesize
197B
MD55b9d84031921f9b574647df0c569e60a
SHA130aad6c6d6171b66134cbfc3a5e6eaf07d56017c
SHA256336df27922a03b1e035707505f2a41268c8e8d660ee2f1ee22d42d706a53270f
SHA51249d65af3e36e4db19b0395c8dfe44dc9e18766477c8126fe27969b9c025dfd99cd81112dc417acbf920e3f82b5dcf5e33544b476b4e2f3168dae0ee3b40f0b7b
-
Filesize
138KB
MD5dc54209ef36b067337fd0de709d653e5
SHA1c5fc3ea9fea4426e93eb3f564ec86f0d730da1b5
SHA25619e6d91a27e49b4413ccba2d670f858576a75d1a2c28d59c5f35c561c8afb010
SHA5128752f4f949fb3f9a225dc4d366b7b4f81da5d32e5664f3ba2db10e38069bee275f0b6522d0504371040e2c5a1c045b294b70202a542a289975e847f24ed2ed3f
-
Filesize
138KB
MD5dc54209ef36b067337fd0de709d653e5
SHA1c5fc3ea9fea4426e93eb3f564ec86f0d730da1b5
SHA25619e6d91a27e49b4413ccba2d670f858576a75d1a2c28d59c5f35c561c8afb010
SHA5128752f4f949fb3f9a225dc4d366b7b4f81da5d32e5664f3ba2db10e38069bee275f0b6522d0504371040e2c5a1c045b294b70202a542a289975e847f24ed2ed3f
-
Filesize
343B
MD56e85d182c63c8405531abea7ab143b1c
SHA16910b2d8f4d238836bfa8af00ed36b5e9f2a5f94
SHA256460b9c471f5d9ce3ab56a892626730203e32027bdfdcdf9beedf1199356a40d0
SHA512f4c2160c4f951aa47d4b5c0ed2c2477540848449d9522dcfe1d6fe2bd205a7836a81955a500323cd373e460b061d94180ce837c904d199085d43df1cd9eca191
-
Filesize
138KB
MD5df8070d60eeaa2e11902c007ad07cd7c
SHA18bf0b0fe998dde2b9b084b46ff7ffed8e713004a
SHA256e5afd145922a4d52076a2ac7890a398130f858020d5037fe37893a30e44f7b5b
SHA5120b192a8c65270be93d28a21237aaf8900fb7f983c6b39838fd24b8861384414ab160fe8eabfeddf0f231e838d436186d3b45d6d372923a3a6814c12ff747e469
-
Filesize
138KB
MD5df8070d60eeaa2e11902c007ad07cd7c
SHA18bf0b0fe998dde2b9b084b46ff7ffed8e713004a
SHA256e5afd145922a4d52076a2ac7890a398130f858020d5037fe37893a30e44f7b5b
SHA5120b192a8c65270be93d28a21237aaf8900fb7f983c6b39838fd24b8861384414ab160fe8eabfeddf0f231e838d436186d3b45d6d372923a3a6814c12ff747e469
-
Filesize
138KB
MD5df8070d60eeaa2e11902c007ad07cd7c
SHA18bf0b0fe998dde2b9b084b46ff7ffed8e713004a
SHA256e5afd145922a4d52076a2ac7890a398130f858020d5037fe37893a30e44f7b5b
SHA5120b192a8c65270be93d28a21237aaf8900fb7f983c6b39838fd24b8861384414ab160fe8eabfeddf0f231e838d436186d3b45d6d372923a3a6814c12ff747e469
-
Filesize
138KB
MD5df8070d60eeaa2e11902c007ad07cd7c
SHA18bf0b0fe998dde2b9b084b46ff7ffed8e713004a
SHA256e5afd145922a4d52076a2ac7890a398130f858020d5037fe37893a30e44f7b5b
SHA5120b192a8c65270be93d28a21237aaf8900fb7f983c6b39838fd24b8861384414ab160fe8eabfeddf0f231e838d436186d3b45d6d372923a3a6814c12ff747e469
-
Filesize
138KB
MD5dc54209ef36b067337fd0de709d653e5
SHA1c5fc3ea9fea4426e93eb3f564ec86f0d730da1b5
SHA25619e6d91a27e49b4413ccba2d670f858576a75d1a2c28d59c5f35c561c8afb010
SHA5128752f4f949fb3f9a225dc4d366b7b4f81da5d32e5664f3ba2db10e38069bee275f0b6522d0504371040e2c5a1c045b294b70202a542a289975e847f24ed2ed3f
-
Filesize
138KB
MD5dc54209ef36b067337fd0de709d653e5
SHA1c5fc3ea9fea4426e93eb3f564ec86f0d730da1b5
SHA25619e6d91a27e49b4413ccba2d670f858576a75d1a2c28d59c5f35c561c8afb010
SHA5128752f4f949fb3f9a225dc4d366b7b4f81da5d32e5664f3ba2db10e38069bee275f0b6522d0504371040e2c5a1c045b294b70202a542a289975e847f24ed2ed3f