Analysis
-
max time kernel
206s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:03
Static task
static1
Behavioral task
behavioral1
Sample
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe
Resource
win10v2004-20220901-en
General
-
Target
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe
-
Size
344KB
-
MD5
345cd25d64cd6eb2b0702936bfc3aeb8
-
SHA1
8858add72003dadfa44e17f727173499449a53b9
-
SHA256
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192
-
SHA512
8f7ba2d109e765560f1bdefa6b85d577f206f429362945245941591f9d9c1bb4ae2ed26a2f622defc22b77ed0c3c3b6256a97d77589d2182cde7c05d8e7aacce
-
SSDEEP
6144:t2YUV+0TPeG9SWK/fObT/bGidhjhxEF0N3hL7VklVA3MZLhcYm9e4yqyQhNNnSZ7:tdUV+0TPLwWK/fObT/bGiA0NFVkWMZLJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
boice.exe264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boice.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe -
Executes dropped EXE 1 IoCs
Processes:
boice.exepid process 720 boice.exe -
Loads dropped DLL 2 IoCs
Processes:
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exepid process 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe -
Adds Run key to start application 2 TTPs 48 IoCs
Processes:
boice.exe264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /x" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /C" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /L" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /k" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /Z" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /d" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /H" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /M" boice.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /z" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /E" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /T" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /t" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /O" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /P" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /X" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /a" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /n" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /S" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /f" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /n" 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /v" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /J" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /B" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /Q" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /b" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /K" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /G" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /e" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /U" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /F" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /D" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /Y" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /u" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /A" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /c" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /V" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /q" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /m" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /j" boice.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /I" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /N" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /l" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /o" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /g" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /R" boice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\boice = "C:\\Users\\Admin\\boice.exe /p" boice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exeboice.exepid process 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe 720 boice.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exeboice.exepid process 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe 720 boice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exedescription pid process target process PID 964 wrote to memory of 720 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe boice.exe PID 964 wrote to memory of 720 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe boice.exe PID 964 wrote to memory of 720 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe boice.exe PID 964 wrote to memory of 720 964 264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe boice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe"C:\Users\Admin\AppData\Local\Temp\264cd3d48a35eeecc725d1ff8fb008a3d1a232f4eed1d9d30d090580e4081192.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\boice.exe"C:\Users\Admin\boice.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD54f7fecad4cd16a58e982e4ad6665887d
SHA12e0da8b5561b1613cf55841e43d05b9f3911ee44
SHA25637dd135205abe11a924189412eb3f26a290f95c1c272c6ca0138ecf596556e57
SHA512e9e70d85d1df03e00279954e5a4dbf45006cd879d7dbcc2142b5626fdf07fa90799d62fed5200b15a3f55d03eaf0fad651b27e0f8d78359ee3966f0b89ad76d3
-
Filesize
344KB
MD54f7fecad4cd16a58e982e4ad6665887d
SHA12e0da8b5561b1613cf55841e43d05b9f3911ee44
SHA25637dd135205abe11a924189412eb3f26a290f95c1c272c6ca0138ecf596556e57
SHA512e9e70d85d1df03e00279954e5a4dbf45006cd879d7dbcc2142b5626fdf07fa90799d62fed5200b15a3f55d03eaf0fad651b27e0f8d78359ee3966f0b89ad76d3
-
Filesize
344KB
MD54f7fecad4cd16a58e982e4ad6665887d
SHA12e0da8b5561b1613cf55841e43d05b9f3911ee44
SHA25637dd135205abe11a924189412eb3f26a290f95c1c272c6ca0138ecf596556e57
SHA512e9e70d85d1df03e00279954e5a4dbf45006cd879d7dbcc2142b5626fdf07fa90799d62fed5200b15a3f55d03eaf0fad651b27e0f8d78359ee3966f0b89ad76d3
-
Filesize
344KB
MD54f7fecad4cd16a58e982e4ad6665887d
SHA12e0da8b5561b1613cf55841e43d05b9f3911ee44
SHA25637dd135205abe11a924189412eb3f26a290f95c1c272c6ca0138ecf596556e57
SHA512e9e70d85d1df03e00279954e5a4dbf45006cd879d7dbcc2142b5626fdf07fa90799d62fed5200b15a3f55d03eaf0fad651b27e0f8d78359ee3966f0b89ad76d3