Analysis
-
max time kernel
152s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe
Resource
win10v2004-20221111-en
General
-
Target
cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe
-
Size
232KB
-
MD5
442e7847a8ecbdccfcb0b799f1235598
-
SHA1
6e22b6056e5dd9917bea931263c8e81459563087
-
SHA256
cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12
-
SHA512
162536b17451feaf5a2f7c28098bfb0fea85d5cd008e57cc18d2af5ebfb901d9fc7a83751ff76164e150bc5267cb3705df5710c512546d8d537a3005abe6e1f9
-
SSDEEP
6144:nVcggg3ADylVl85IwwiXeujvWBxD2dMp/FFc8bZfq:Vcy3ADylVl85IwwiXeujvWBxD2dO/FLA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roilaid.exe -
Executes dropped EXE 1 IoCs
pid Process 556 roilaid.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /N" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /d" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /Z" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /z" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /n" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /j" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /p" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /D" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /R" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /S" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /X" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /U" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /I" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /c" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /e" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /F" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /Q" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /Y" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /r" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /E" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /G" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /H" roilaid.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /l" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /T" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /q" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /J" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /W" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /L" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /i" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /o" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /A" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /w" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /v" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /C" roilaid.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /f" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /O" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /x" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /K" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /P" cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /h" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /k" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /u" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /s" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /V" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /M" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /y" roilaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\roilaid = "C:\\Users\\Admin\\roilaid.exe /g" roilaid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe 556 roilaid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 556 roilaid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 556 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 28 PID 1872 wrote to memory of 556 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 28 PID 1872 wrote to memory of 556 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 28 PID 1872 wrote to memory of 556 1872 cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe"C:\Users\Admin\AppData\Local\Temp\cda938c0ca7c5bd84750d0275953e3b9ac399a967819437f5305b532d22edb12.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\roilaid.exe"C:\Users\Admin\roilaid.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD53478e03075655e676d1afb814fbc69eb
SHA11e1d795ae32abf0c5ad90100b3844cde9ad146b9
SHA256ad05d8808c52c53516323de136cd0013be66fe076fcc2d13429fcfeefd3ce221
SHA512ca41a45ca63df4a201f888fbc7f7c717b1ef6d6357405fbd0e93b1d05291abf25631ea97f4f107fc37e912382b47829d7a2cd0dfbbacde17519c2803b9adbf3a
-
Filesize
232KB
MD53478e03075655e676d1afb814fbc69eb
SHA11e1d795ae32abf0c5ad90100b3844cde9ad146b9
SHA256ad05d8808c52c53516323de136cd0013be66fe076fcc2d13429fcfeefd3ce221
SHA512ca41a45ca63df4a201f888fbc7f7c717b1ef6d6357405fbd0e93b1d05291abf25631ea97f4f107fc37e912382b47829d7a2cd0dfbbacde17519c2803b9adbf3a
-
Filesize
232KB
MD53478e03075655e676d1afb814fbc69eb
SHA11e1d795ae32abf0c5ad90100b3844cde9ad146b9
SHA256ad05d8808c52c53516323de136cd0013be66fe076fcc2d13429fcfeefd3ce221
SHA512ca41a45ca63df4a201f888fbc7f7c717b1ef6d6357405fbd0e93b1d05291abf25631ea97f4f107fc37e912382b47829d7a2cd0dfbbacde17519c2803b9adbf3a
-
Filesize
232KB
MD53478e03075655e676d1afb814fbc69eb
SHA11e1d795ae32abf0c5ad90100b3844cde9ad146b9
SHA256ad05d8808c52c53516323de136cd0013be66fe076fcc2d13429fcfeefd3ce221
SHA512ca41a45ca63df4a201f888fbc7f7c717b1ef6d6357405fbd0e93b1d05291abf25631ea97f4f107fc37e912382b47829d7a2cd0dfbbacde17519c2803b9adbf3a