Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe
Resource
win10v2004-20220901-en
General
-
Target
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe
-
Size
212KB
-
MD5
187fbb77103a8daf0bd9f8e0ad3e6a80
-
SHA1
e0bcb7e771c4e0314ea1e6edb1e500eb166ea8b9
-
SHA256
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0
-
SHA512
6a7616b966699859a4042103c68c1cdc23438c95f0986be64f9a8a68e6545f496e724c365b6999f8db090f02478a51c912313d4918750fa313d88ad97b29b46b
-
SSDEEP
6144:ep4VqIrqJQNbufrI4ukDnx/8vtvwzsmMAEu3Wev5kBirl87VFt6En9x7Xf7oufax:ep4zmGbMrI4ukDnx/8vtvwzsmMAEGHv9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exejaaig.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaaig.exe -
Executes dropped EXE 1 IoCs
Processes:
jaaig.exepid process 4976 jaaig.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exejaaig.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /I" 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /O" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /r" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /I" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /C" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /q" jaaig.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /T" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /W" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /a" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /x" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /n" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /y" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /U" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /E" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /g" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /s" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /u" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /j" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /B" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /M" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /S" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /d" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /G" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /h" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /v" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /k" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /V" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /m" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /w" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /Q" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /D" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /c" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /Y" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /L" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /e" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /Z" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /N" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /F" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /b" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /i" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /P" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /H" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /A" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /K" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /R" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /l" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /X" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /z" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /o" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /p" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /t" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /f" jaaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaaig = "C:\\Users\\Admin\\jaaig.exe /J" jaaig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exejaaig.exepid process 5028 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe 5028 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe 4976 jaaig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exejaaig.exepid process 5028 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe 4976 jaaig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exedescription pid process target process PID 5028 wrote to memory of 4976 5028 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe jaaig.exe PID 5028 wrote to memory of 4976 5028 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe jaaig.exe PID 5028 wrote to memory of 4976 5028 73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe jaaig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe"C:\Users\Admin\AppData\Local\Temp\73fa429d1f9d8d6c8b019fb8988b1b853df194aefe8bd1461c83c815d8addcb0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\jaaig.exe"C:\Users\Admin\jaaig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5d79ee41bdb2db90f61b2f6e5d94313af
SHA1219f78c1db7b0117f8fe1c9a3f9b5cbedc63d8d4
SHA256a56320263c5f87b29e42c10bed8fe641d853988cf1b42ac994a5ed7772aed5d7
SHA512a9cb929310a251756a21255dff4fa8c7b5e08cc57898d0345b1705fc4d78fdcbca33c93e32ae3a640bc6eb21e5c899d0f89df7da083d613e91f05d861b8978fe
-
Filesize
212KB
MD5d79ee41bdb2db90f61b2f6e5d94313af
SHA1219f78c1db7b0117f8fe1c9a3f9b5cbedc63d8d4
SHA256a56320263c5f87b29e42c10bed8fe641d853988cf1b42ac994a5ed7772aed5d7
SHA512a9cb929310a251756a21255dff4fa8c7b5e08cc57898d0345b1705fc4d78fdcbca33c93e32ae3a640bc6eb21e5c899d0f89df7da083d613e91f05d861b8978fe