Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe
Resource
win10v2004-20221111-en
General
-
Target
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe
-
Size
260KB
-
MD5
5747e1a808e070a884a78b672f661b00
-
SHA1
29a67bb88034f42f5e35b4d5d1c6f40f69b36fd2
-
SHA256
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b
-
SHA512
f312179f2439ad691f9b9bdfae89edece04a89412b2c90229d5df32fc7cc90d7e1820781abaa366e65deb8669755d3f77947b899a4d3969c81e2f972a8bb6e5e
-
SSDEEP
6144:nd7IgTSrMaIl/jcLijfHFEHWzXvjT85R:npNTSrMaIqLlI/H85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
saagier.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saagier.exe -
Executes dropped EXE 1 IoCs
Processes:
saagier.exepid process 1528 saagier.exe -
Loads dropped DLL 2 IoCs
Processes:
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exepid process 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe -
Adds Run key to start application 2 TTPs 50 IoCs
Processes:
saagier.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /N" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /G" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /E" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /p" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /v" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /S" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /t" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /P" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /b" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /a" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /V" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /u" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /D" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /J" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /W" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /I" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /d" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /m" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /O" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /R" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /n" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /f" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /h" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /i" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /w" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /z" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /q" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /Y" saagier.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /g" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /o" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /T" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /M" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /H" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /y" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /F" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /s" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /j" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /U" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /X" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /k" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /A" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /l" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /r" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /B" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /K" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /C" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /Q" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /c" saagier.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\saagier = "C:\\Users\\Admin\\saagier.exe /Z" saagier.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
saagier.exepid process 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe 1528 saagier.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exesaagier.exepid process 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe 1528 saagier.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exedescription pid process target process PID 1460 wrote to memory of 1528 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe saagier.exe PID 1460 wrote to memory of 1528 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe saagier.exe PID 1460 wrote to memory of 1528 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe saagier.exe PID 1460 wrote to memory of 1528 1460 2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe saagier.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe"C:\Users\Admin\AppData\Local\Temp\2c0b1452a2040ef98befc67dafa820318bf681a83b283f6907cbe8ae4819bd7b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\saagier.exe"C:\Users\Admin\saagier.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD56ac0069bd59ee22ee1e14f0f6a2724d9
SHA1494e20ec95d0a010fe3ec4756d3b7816b103658f
SHA256d5b735ff2220bead73f0a392891eed68337e198a92f6bb25f5dd3f1e484d6c24
SHA512c72f3f9bd8c2342c1779840cc84c9f7eebd6546fc2ed5705b9fee961ff60386072f1cda1fec78d0fad98077ebcef1e276fb8f23f46daa33e660d4793ec34ad05
-
Filesize
260KB
MD56ac0069bd59ee22ee1e14f0f6a2724d9
SHA1494e20ec95d0a010fe3ec4756d3b7816b103658f
SHA256d5b735ff2220bead73f0a392891eed68337e198a92f6bb25f5dd3f1e484d6c24
SHA512c72f3f9bd8c2342c1779840cc84c9f7eebd6546fc2ed5705b9fee961ff60386072f1cda1fec78d0fad98077ebcef1e276fb8f23f46daa33e660d4793ec34ad05
-
Filesize
260KB
MD56ac0069bd59ee22ee1e14f0f6a2724d9
SHA1494e20ec95d0a010fe3ec4756d3b7816b103658f
SHA256d5b735ff2220bead73f0a392891eed68337e198a92f6bb25f5dd3f1e484d6c24
SHA512c72f3f9bd8c2342c1779840cc84c9f7eebd6546fc2ed5705b9fee961ff60386072f1cda1fec78d0fad98077ebcef1e276fb8f23f46daa33e660d4793ec34ad05
-
Filesize
260KB
MD56ac0069bd59ee22ee1e14f0f6a2724d9
SHA1494e20ec95d0a010fe3ec4756d3b7816b103658f
SHA256d5b735ff2220bead73f0a392891eed68337e198a92f6bb25f5dd3f1e484d6c24
SHA512c72f3f9bd8c2342c1779840cc84c9f7eebd6546fc2ed5705b9fee961ff60386072f1cda1fec78d0fad98077ebcef1e276fb8f23f46daa33e660d4793ec34ad05