Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:05
Static task
static1
Behavioral task
behavioral1
Sample
4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe
Resource
win10v2004-20221111-en
General
-
Target
4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe
-
Size
240KB
-
MD5
29dd8a1363f273644c5f87554c1a69fa
-
SHA1
0393f6d2dd6dd3dc9f709830b7e3f89e1410bac8
-
SHA256
4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4
-
SHA512
9a5bf2747fd965f7ac7ff310c8aefd156804488798f48f917280bd176ce687fa97be6b01d36ce4c712e3a013727864b244f698ac8a0280804bfb0a9402f0c2f9
-
SSDEEP
6144:wx3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDIM:w9dQKjeaEEp/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rianu.exe -
Executes dropped EXE 1 IoCs
pid Process 860 rianu.exe -
Loads dropped DLL 2 IoCs
pid Process 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /c" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /r" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /d" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /z" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /s" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /o" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /k" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /l" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /f" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /i" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /h" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /v" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /w" rianu.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /u" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /j" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /m" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /b" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /y" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /c" 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /n" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /t" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /x" rianu.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /a" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /q" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /e" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /p" rianu.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\rianu = "C:\\Users\\Admin\\rianu.exe /g" rianu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe 860 rianu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 860 rianu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 860 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 28 PID 1428 wrote to memory of 860 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 28 PID 1428 wrote to memory of 860 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 28 PID 1428 wrote to memory of 860 1428 4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe"C:\Users\Admin\AppData\Local\Temp\4fa385441ea5ec2fa26cf7805701706317672d01ab28da51636b747a6d835ec4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\rianu.exe"C:\Users\Admin\rianu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5c89d9f021ec490cc09fd538d22c95633
SHA18ce03f1fd98f983e1695bec206846f8fc6b04b0c
SHA256a05db8f96f11df6207ae7328764716bd84f4ed58254de43ffb39ff10b69cc80b
SHA51248cba2cfb9a30c9998a9a6b41f265022ae30df795ceb0ea18cdcc233f694b2c8fd76124e946441bb42685d0186ac85249d977287c7a9c86ca006d39f4be196ec
-
Filesize
240KB
MD5c89d9f021ec490cc09fd538d22c95633
SHA18ce03f1fd98f983e1695bec206846f8fc6b04b0c
SHA256a05db8f96f11df6207ae7328764716bd84f4ed58254de43ffb39ff10b69cc80b
SHA51248cba2cfb9a30c9998a9a6b41f265022ae30df795ceb0ea18cdcc233f694b2c8fd76124e946441bb42685d0186ac85249d977287c7a9c86ca006d39f4be196ec
-
Filesize
240KB
MD5c89d9f021ec490cc09fd538d22c95633
SHA18ce03f1fd98f983e1695bec206846f8fc6b04b0c
SHA256a05db8f96f11df6207ae7328764716bd84f4ed58254de43ffb39ff10b69cc80b
SHA51248cba2cfb9a30c9998a9a6b41f265022ae30df795ceb0ea18cdcc233f694b2c8fd76124e946441bb42685d0186ac85249d977287c7a9c86ca006d39f4be196ec
-
Filesize
240KB
MD5c89d9f021ec490cc09fd538d22c95633
SHA18ce03f1fd98f983e1695bec206846f8fc6b04b0c
SHA256a05db8f96f11df6207ae7328764716bd84f4ed58254de43ffb39ff10b69cc80b
SHA51248cba2cfb9a30c9998a9a6b41f265022ae30df795ceb0ea18cdcc233f694b2c8fd76124e946441bb42685d0186ac85249d977287c7a9c86ca006d39f4be196ec