Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe
Resource
win10v2004-20220901-en
General
-
Target
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe
-
Size
248KB
-
MD5
5d9265c93ee17a13e82279b744af251c
-
SHA1
ec01ba3f8cccbcdab51d9a3e070cbd8f4a68fd35
-
SHA256
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d
-
SHA512
f4a81a5ec450108efb062d169de83417eded90e4502866e60b998235d844c2eb8d1820baf68875ef573e5bef95bc6fde83f035d206bc7250eeba8a655c7343b0
-
SSDEEP
6144:NxpM5CElofkFWQPtnRneqAKnvmb7/D269fgwMty0e6ndv0D:NU5CLkFfnRnWKnvmb7/D26qndv0D
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exeslraz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" slraz.exe -
Executes dropped EXE 1 IoCs
Processes:
slraz.exepid process 4396 slraz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe -
Adds Run key to start application 2 TTPs 53 IoCs
Processes:
slraz.exede34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /U" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /a" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /x" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /L" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /W" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /r" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /j" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /S" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /N" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /D" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /Y" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /E" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /V" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /t" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /b" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /O" slraz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /F" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /e" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /J" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /d" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /v" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /Z" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /R" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /C" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /X" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /o" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /w" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /l" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /z" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /n" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /i" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /y" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /h" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /G" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /q" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /m" slraz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /H" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /k" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /P" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /M" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /g" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /m" de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /c" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /T" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /Q" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /f" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /B" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /u" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /A" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /K" slraz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\slraz = "C:\\Users\\Admin\\slraz.exe /s" slraz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exeslraz.exepid process 1688 de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe 1688 de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe 4396 slraz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exeslraz.exepid process 1688 de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe 4396 slraz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exedescription pid process target process PID 1688 wrote to memory of 4396 1688 de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe slraz.exe PID 1688 wrote to memory of 4396 1688 de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe slraz.exe PID 1688 wrote to memory of 4396 1688 de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe slraz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe"C:\Users\Admin\AppData\Local\Temp\de34ea6ad32698d68e78ec010c8f6173d018fd223c197ee25ebf00f324b4878d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\slraz.exe"C:\Users\Admin\slraz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5e0c5ee5f7f9a3ecb7e204801d3c9b039
SHA1e57148cc8827d9eada421383b02a0e21c4dae590
SHA256baf8b81f69b86c3667f41500b48f672b11c784803bea18836148c0dda5f7348e
SHA51298509441c814147c9267633bc9e089c82e497ccc502c90c6bedeab3d0e03fc6a9be4dd1dd1c9617c3efc3d5be0ce28b3b0980561948cf2fcccb3599d0bd8f7a1
-
Filesize
248KB
MD5e0c5ee5f7f9a3ecb7e204801d3c9b039
SHA1e57148cc8827d9eada421383b02a0e21c4dae590
SHA256baf8b81f69b86c3667f41500b48f672b11c784803bea18836148c0dda5f7348e
SHA51298509441c814147c9267633bc9e089c82e497ccc502c90c6bedeab3d0e03fc6a9be4dd1dd1c9617c3efc3d5be0ce28b3b0980561948cf2fcccb3599d0bd8f7a1