Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe
Resource
win10v2004-20220812-en
General
-
Target
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe
-
Size
344KB
-
MD5
4b71ebffe6335cfc46001df8d105de70
-
SHA1
7f8f291cc038c3fd60362807273f9bccd567b45c
-
SHA256
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15
-
SHA512
f275a610f26d00afcac23e86ea06f18291e3b79b74060d42bf36cd98cddb2fc2c1c7e485a5e6352fc93a3d8005b85bad04240205bf487c065448bc3fefc071a3
-
SSDEEP
6144:DmyVIlx/STuiNGEDB0IMuwPkrcmhh7lvyNdh9cDaX/m7bfTWafFZ5S4YvVZ9PkHP:SQm/STuiNGEDB0IMuwPWfZvyNdh9cDau
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exemiajaor.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miajaor.exe -
Executes dropped EXE 1 IoCs
Processes:
miajaor.exepid process 3768 miajaor.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
miajaor.exebf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /k" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /I" bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /m" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /o" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /A" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /G" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /l" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /S" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /y" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /U" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /i" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /p" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /J" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /I" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /Q" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /R" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /W" miajaor.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /u" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /L" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /s" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /r" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /E" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /n" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /e" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /q" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /V" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /w" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /z" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /b" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /P" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /a" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /C" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /Y" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /h" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /g" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /K" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /B" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /D" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /x" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /H" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /v" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /N" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /j" miajaor.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /M" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /T" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /t" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /d" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /Z" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /F" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /f" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /X" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /O" miajaor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miajaor = "C:\\Users\\Admin\\miajaor.exe /c" miajaor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exemiajaor.exepid process 1556 bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe 1556 bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe 3768 miajaor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exemiajaor.exepid process 1556 bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe 3768 miajaor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exedescription pid process target process PID 1556 wrote to memory of 3768 1556 bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe miajaor.exe PID 1556 wrote to memory of 3768 1556 bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe miajaor.exe PID 1556 wrote to memory of 3768 1556 bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe miajaor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe"C:\Users\Admin\AppData\Local\Temp\bf116b7685a6cb355df26acab15b47f62789a43cbce8ecfcc5f1ccf98e0aaf15.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\miajaor.exe"C:\Users\Admin\miajaor.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5c38b0736cb62a4cfdc237bb9f4afed98
SHA18c11d083ec1d5333a8416592f0d3a67159f1c9e4
SHA256c8713abb8218ea78b81c331530e9381d8d1b0efee140e7b3d245f8f7b01773dc
SHA512429371d3ffd98d65ecc7fd85c43a38c42b9c59561d54f0b0384946e4d6fa4d77035ea39395117e8c8f104b459e7544eee4ff1a67d7ddf66f9e4a5946c7efec8c
-
Filesize
344KB
MD5c38b0736cb62a4cfdc237bb9f4afed98
SHA18c11d083ec1d5333a8416592f0d3a67159f1c9e4
SHA256c8713abb8218ea78b81c331530e9381d8d1b0efee140e7b3d245f8f7b01773dc
SHA512429371d3ffd98d65ecc7fd85c43a38c42b9c59561d54f0b0384946e4d6fa4d77035ea39395117e8c8f104b459e7544eee4ff1a67d7ddf66f9e4a5946c7efec8c