Analysis
-
max time kernel
181s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:16
Static task
static1
Behavioral task
behavioral1
Sample
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe
Resource
win10v2004-20221111-en
General
-
Target
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe
-
Size
140KB
-
MD5
3457874a25fd377a91fe67b7dd546664
-
SHA1
86f2c7999384408b1ccdc2996716a639e0e18620
-
SHA256
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca
-
SHA512
4c0fa3e4359ac38f0c58fc3b914df46f15ed29448ceb89171393a5772eec1f1e603135843b3a0a5cbc660da0bafdf76e3c422486e47710632be66522cd5f75c9
-
SSDEEP
3072:Qa8+c3vu3XuIcN6/xbccM3hDL8fyUha5fJiwt:Qai/uuIcNmL08dhaRJiW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exemiayid.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miayid.exe -
Executes dropped EXE 1 IoCs
Processes:
miayid.exepid process 3940 miayid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe -
Adds Run key to start application 2 TTPs 51 IoCs
Processes:
miayid.exec49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /C" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /i" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /F" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /f" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /U" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /t" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /A" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /z" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /G" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /w" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /a" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /q" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /u" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /J" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /d" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /g" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /b" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /r" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /v" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /K" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /V" miayid.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /L" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /x" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /M" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /R" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /l" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /c" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /e" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /k" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /h" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /Q" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /n" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /a" c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /o" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /p" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /y" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /Z" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /W" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /T" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /B" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /H" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /j" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /N" miayid.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /s" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /P" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /E" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /S" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /X" miayid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miayid = "C:\\Users\\Admin\\miayid.exe /Y" miayid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exemiayid.exepid process 2816 c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe 2816 c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe 3940 miayid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exemiayid.exepid process 2816 c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe 3940 miayid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exedescription pid process target process PID 2816 wrote to memory of 3940 2816 c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe miayid.exe PID 2816 wrote to memory of 3940 2816 c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe miayid.exe PID 2816 wrote to memory of 3940 2816 c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe miayid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe"C:\Users\Admin\AppData\Local\Temp\c49a8a525df6a94c46f3b164edf93df432d786f82acc7801bbb5cbf51f0f3fca.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\miayid.exe"C:\Users\Admin\miayid.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5b4780f08e795a1121333132fc7a6a9f4
SHA113b09ec5b95d32a7b5ea63148e08263a740634bb
SHA256c1adeaa273957bab9d26bb035c15e25c7e0a47830565bb414b623f3c86b00e09
SHA51226bc4b847d8c96af2b92c3837d1240244e4f2b2778ae31cc7cdcda8b4f28f1b0488aae721dd29bc28c97b551e4bf07ae1b4fc7b171f29fc7e5a807f87fed7d41
-
Filesize
140KB
MD5b4780f08e795a1121333132fc7a6a9f4
SHA113b09ec5b95d32a7b5ea63148e08263a740634bb
SHA256c1adeaa273957bab9d26bb035c15e25c7e0a47830565bb414b623f3c86b00e09
SHA51226bc4b847d8c96af2b92c3837d1240244e4f2b2778ae31cc7cdcda8b4f28f1b0488aae721dd29bc28c97b551e4bf07ae1b4fc7b171f29fc7e5a807f87fed7d41