Analysis
-
max time kernel
197s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe
Resource
win10v2004-20221111-en
General
-
Target
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe
-
Size
292KB
-
MD5
25b044f74ad792c832040c6abf559751
-
SHA1
16399ab3c12aebc66555b4fc94d53bd326537e74
-
SHA256
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84
-
SHA512
42f348d9cf4c0ea713c0a19984e16a8f76c455bfbe02f734b3200106128d5d7ae8074ffd04d9bb77f68053564822f23b3b293a42c4c1e46a4edb9483cd3bcb5a
-
SSDEEP
6144:Ynn5VHiComrw0XFnXXQYmRZEcp3ROI4lStQaiSaWUtEU:85oPmrn1nXXQYuZEcp3ROI4lStQaiSaF
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
houlaic.exee5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" houlaic.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe -
Executes dropped EXE 1 IoCs
Processes:
houlaic.exepid process 3520 houlaic.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe -
Adds Run key to start application 2 TTPs 50 IoCs
Processes:
houlaic.exee5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /v" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /P" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /R" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /i" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /k" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /o" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /T" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /Y" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /F" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /d" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /I" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /G" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /W" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /V" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /A" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /O" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /C" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /h" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /H" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /u" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /s" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /x" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /Z" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /p" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /l" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /n" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /f" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /L" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /b" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /w" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /y" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /j" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /M" houlaic.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /e" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /g" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /B" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /X" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /Q" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /a" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /C" e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /z" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /S" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /m" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /c" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /r" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /U" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /K" houlaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\houlaic = "C:\\Users\\Admin\\houlaic.exe /D" houlaic.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exehoulaic.exepid process 4800 e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe 4800 e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe 3520 houlaic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exehoulaic.exepid process 4800 e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe 3520 houlaic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exedescription pid process target process PID 4800 wrote to memory of 3520 4800 e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe houlaic.exe PID 4800 wrote to memory of 3520 4800 e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe houlaic.exe PID 4800 wrote to memory of 3520 4800 e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe houlaic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe"C:\Users\Admin\AppData\Local\Temp\e5a96ddb3fcd847d05e3379a79a99f962e9535381a2b187f0d1b316cc9cb2e84.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\houlaic.exe"C:\Users\Admin\houlaic.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD55d70314dc7695957dc4088d408e145c3
SHA1f2f29f9f1732d6043da4904903b1936bbb2f46c0
SHA2566375dbd326d0bb06a338ebc1e6921d65852b923f1009603dff9235dc01e5b9d3
SHA512e9d502297500d0d70ae1fab0a8cbb77f5a94a54e95554cd29fd1c7183ff5db4b4885723a662a5031a16fae6c6a378154d1ef99dd435ab5a235c7835973bd3843
-
Filesize
292KB
MD55d70314dc7695957dc4088d408e145c3
SHA1f2f29f9f1732d6043da4904903b1936bbb2f46c0
SHA2566375dbd326d0bb06a338ebc1e6921d65852b923f1009603dff9235dc01e5b9d3
SHA512e9d502297500d0d70ae1fab0a8cbb77f5a94a54e95554cd29fd1c7183ff5db4b4885723a662a5031a16fae6c6a378154d1ef99dd435ab5a235c7835973bd3843