Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe
Resource
win10v2004-20220812-en
General
-
Target
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe
-
Size
248KB
-
MD5
25efd5741079fc0f785406b863745733
-
SHA1
dc614bec7d891327e849639f9accf1ed06ec9794
-
SHA256
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd
-
SHA512
c4867717f046568b149c05d6f12845013c9a01fc8ad17a50a0a6c20ef3d16fb2460b9816da08682c4ff128885b5d0bd26b29cfd583089121e2c2b9e7bdbaedd2
-
SSDEEP
3072:54clvBhDo0BKxWVeBYhInpMFgYykBgfXzRRpGPlOH+cZknPh43Ucl:Wcl3dgEeqPFXTgfV6PlOH+gKPu3x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exetekal.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tekal.exe -
Executes dropped EXE 1 IoCs
Processes:
tekal.exepid process 1028 tekal.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
tekal.exe8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /H" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /g" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /T" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /F" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /D" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /V" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /J" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /m" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /j" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /s" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /L" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /S" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /t" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /h" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /e" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /q" 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /C" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /x" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /u" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /l" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /n" tekal.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /O" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /i" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /Y" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /k" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /B" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /P" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /c" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /M" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /b" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /v" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /E" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /r" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /w" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /z" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /N" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /y" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /A" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /K" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /Q" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /X" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /q" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /d" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /G" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /o" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /f" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /a" tekal.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /p" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /U" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /W" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /R" tekal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tekal = "C:\\Users\\Admin\\tekal.exe /Z" tekal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exetekal.exepid process 808 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe 808 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe 1028 tekal.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exetekal.exepid process 808 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe 1028 tekal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exedescription pid process target process PID 808 wrote to memory of 1028 808 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe tekal.exe PID 808 wrote to memory of 1028 808 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe tekal.exe PID 808 wrote to memory of 1028 808 8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe tekal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe"C:\Users\Admin\AppData\Local\Temp\8d0ebdc5d2c6904503406660e51fb3abb9098f7ff764a30d3d5e3046271aa3dd.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\tekal.exe"C:\Users\Admin\tekal.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD54b8df7419502f90795116bc79895b840
SHA118ca4ca8c3e99b35e0bf34efcfb7ae88e08c353e
SHA256fc185b0603bdab5fc4c10efdde4fb119fe30ed8785819ba5748c7aeca5d29112
SHA5129b0e468e4bcbd8c196102e4767f8426718324db4b186962f157c166cc9cdd731cf5a9556484ef09fad420a89c0e4bdde741b6ab8962439527c28322c6340344a
-
Filesize
248KB
MD54b8df7419502f90795116bc79895b840
SHA118ca4ca8c3e99b35e0bf34efcfb7ae88e08c353e
SHA256fc185b0603bdab5fc4c10efdde4fb119fe30ed8785819ba5748c7aeca5d29112
SHA5129b0e468e4bcbd8c196102e4767f8426718324db4b186962f157c166cc9cdd731cf5a9556484ef09fad420a89c0e4bdde741b6ab8962439527c28322c6340344a