Analysis
-
max time kernel
149s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:40
Static task
static1
Behavioral task
behavioral1
Sample
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe
Resource
win10v2004-20221111-en
General
-
Target
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe
-
Size
76KB
-
MD5
0cfa9fbedc5413ec26ecfdb96553a4e1
-
SHA1
9a4755d3ce3bd6df8f6acea6ebf6239463d6b5fc
-
SHA256
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22
-
SHA512
daf09881aed9057e15a9a875993d974cd2910b8979ea9d2bdfa2a125bb50073633b451c25f24031d50b9024debbddac35a2396d6ec3e782836fa12ed419e594d
-
SSDEEP
768:7embNRqsuhlGOBrhgFwumSCbxTGy/BBGg4NKJJKqUThbJ32+ve7i40vN0TlT+Xkq:tnqdu3abBGy3G8V0iuo2X
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
hama.exea99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
Processes:
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exehama.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hama.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exehama.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hama.exe -
Executes dropped EXE 1 IoCs
Processes:
hama.exepid process 1752 hama.exe -
Loads dropped DLL 2 IoCs
Processes:
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exepid process 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
hama.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hama.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
hama.exedescription ioc process File opened (read-only) \??\U: hama.exe File opened (read-only) \??\H: hama.exe File opened (read-only) \??\M: hama.exe File opened (read-only) \??\N: hama.exe File opened (read-only) \??\T: hama.exe File opened (read-only) \??\E: hama.exe File opened (read-only) \??\J: hama.exe File opened (read-only) \??\O: hama.exe File opened (read-only) \??\X: hama.exe File opened (read-only) \??\G: hama.exe File opened (read-only) \??\R: hama.exe File opened (read-only) \??\S: hama.exe File opened (read-only) \??\Y: hama.exe File opened (read-only) \??\L: hama.exe File opened (read-only) \??\P: hama.exe File opened (read-only) \??\Q: hama.exe File opened (read-only) \??\V: hama.exe File opened (read-only) \??\B: hama.exe File opened (read-only) \??\F: hama.exe File opened (read-only) \??\I: hama.exe File opened (read-only) \??\K: hama.exe File opened (read-only) \??\W: hama.exe File opened (read-only) \??\Z: hama.exe -
Drops file in System32 directory 6 IoCs
Processes:
hama.exea99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exedescription ioc process File created \??\c:\windows\SysWOW64\Desktop.sysm hama.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm hama.exe File created \??\c:\windows\SysWOW64\maxtrox.txt a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt hama.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr hama.exe -
Drops file in Program Files directory 34 IoCs
Processes:
hama.exedescription ioc process File opened for modification \??\c:\Program Files\7-Zip\7zG.exe hama.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe hama.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe hama.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe hama.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe hama.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe hama.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe hama.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe hama.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe hama.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe hama.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe hama.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe hama.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe hama.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe hama.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe hama.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe hama.exe -
Modifies registry class 36 IoCs
Processes:
hama.exea99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" hama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command hama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exehama.exepid process 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe 1752 hama.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exedescription pid process target process PID 1848 wrote to memory of 1752 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe hama.exe PID 1848 wrote to memory of 1752 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe hama.exe PID 1848 wrote to memory of 1752 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe hama.exe PID 1848 wrote to memory of 1752 1848 a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe hama.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe"C:\Users\Admin\AppData\Local\Temp\a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf22.exe"1⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\hama.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\hama.exe" a99e0e2de349279a4522a632cfcefe879c557bf0f439f97a6af91534f97ebf222⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5422be0af571d182f1a7cdddc68b6bcc4
SHA10969848ff047cbddb282fcc762f77b04a5264feb
SHA256e56de5c2a4a0ed1e44c48b4db631e01f341773c4276ce6fecb055f9492cb3878
SHA512aa1b44a0b5c4a73f8da66bbec736c0ac1a83e3d35b90c82e3f310e811bf7384b5f382f730246f3d509f7ec4d885535a681d28dcd2a65e6726b2a2264fcaafb60
-
Filesize
76KB
MD5422be0af571d182f1a7cdddc68b6bcc4
SHA10969848ff047cbddb282fcc762f77b04a5264feb
SHA256e56de5c2a4a0ed1e44c48b4db631e01f341773c4276ce6fecb055f9492cb3878
SHA512aa1b44a0b5c4a73f8da66bbec736c0ac1a83e3d35b90c82e3f310e811bf7384b5f382f730246f3d509f7ec4d885535a681d28dcd2a65e6726b2a2264fcaafb60
-
Filesize
76KB
MD52e299c3119a22ef26e4d51577c6ace05
SHA1cb522d2455e023eed7382fb9c92cdf1101b3605a
SHA256b61e2c3f71f6d4917b0e4ad41b2f568a7b77aa501b99091de42e9b72e281a65a
SHA512ecaa5eb8279cd2082eb0b7694df75a82263355c431c029ce8a1ad64c83b318adf09bb8ea30f300f7e8bb819ca46eb10984af1493272126c2f63b228732226ebe
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
76KB
MD5422be0af571d182f1a7cdddc68b6bcc4
SHA10969848ff047cbddb282fcc762f77b04a5264feb
SHA256e56de5c2a4a0ed1e44c48b4db631e01f341773c4276ce6fecb055f9492cb3878
SHA512aa1b44a0b5c4a73f8da66bbec736c0ac1a83e3d35b90c82e3f310e811bf7384b5f382f730246f3d509f7ec4d885535a681d28dcd2a65e6726b2a2264fcaafb60
-
Filesize
76KB
MD5422be0af571d182f1a7cdddc68b6bcc4
SHA10969848ff047cbddb282fcc762f77b04a5264feb
SHA256e56de5c2a4a0ed1e44c48b4db631e01f341773c4276ce6fecb055f9492cb3878
SHA512aa1b44a0b5c4a73f8da66bbec736c0ac1a83e3d35b90c82e3f310e811bf7384b5f382f730246f3d509f7ec4d885535a681d28dcd2a65e6726b2a2264fcaafb60