Analysis
-
max time kernel
201s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe
Resource
win10v2004-20220812-en
General
-
Target
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe
-
Size
224KB
-
MD5
03371be526b8987b6185d22840f73891
-
SHA1
5226c3d9b23b0280fb718c777581fa3a461138ab
-
SHA256
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892
-
SHA512
6b3dfec52c19ca8a56cb2d663d30c45992f9cabea0c7dc8c1f7a74b9fbca8cb6852dd92a1228efca3445da00830040502264dffb17baeba8158b37045cd25a32
-
SSDEEP
3072:1XyqNsMoBuVjCZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbaxb:MqN5VjKp4LnbmlrZW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exehouji.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" houji.exe -
Executes dropped EXE 1 IoCs
Processes:
houji.exepid process 1092 houji.exe -
Loads dropped DLL 2 IoCs
Processes:
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exepid process 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe -
Adds Run key to start application 2 TTPs 28 IoCs
Processes:
houji.exeeed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /v" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /w" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /d" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /l" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /q" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /s" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /f" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /u" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /e" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /o" houji.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /m" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /x" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /b" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /p" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /n" houji.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /n" eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /r" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /a" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /z" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /g" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /c" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /j" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /i" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /t" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /k" houji.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\houji = "C:\\Users\\Admin\\houji.exe /h" houji.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exehouji.exepid process 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe 1092 houji.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exehouji.exepid process 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe 1092 houji.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exedescription pid process target process PID 952 wrote to memory of 1092 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe houji.exe PID 952 wrote to memory of 1092 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe houji.exe PID 952 wrote to memory of 1092 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe houji.exe PID 952 wrote to memory of 1092 952 eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe houji.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe"C:\Users\Admin\AppData\Local\Temp\eed2e9bffb3a85b80ccf9dab6e18ed17759f9dc3388a5819ab8e909c96553892.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\houji.exe"C:\Users\Admin\houji.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5632b90d20b75e5032a9a3c477dd62c15
SHA1e35cd7926f5a322afccb5a7e6fc15d90cb1f4df5
SHA2562b587ea9effc71ec0fbe033c8d419f23cbf186627ff9fe21188c76d528cc61d0
SHA512fabedc4cad6c9160b42f60ca065573198500478c4d3263bcf1819e6fc63b64be859760462257eabec7b9b2a2e1b971684166e09e9dc6742321cdfefc61e8c022
-
Filesize
224KB
MD5632b90d20b75e5032a9a3c477dd62c15
SHA1e35cd7926f5a322afccb5a7e6fc15d90cb1f4df5
SHA2562b587ea9effc71ec0fbe033c8d419f23cbf186627ff9fe21188c76d528cc61d0
SHA512fabedc4cad6c9160b42f60ca065573198500478c4d3263bcf1819e6fc63b64be859760462257eabec7b9b2a2e1b971684166e09e9dc6742321cdfefc61e8c022
-
Filesize
224KB
MD5632b90d20b75e5032a9a3c477dd62c15
SHA1e35cd7926f5a322afccb5a7e6fc15d90cb1f4df5
SHA2562b587ea9effc71ec0fbe033c8d419f23cbf186627ff9fe21188c76d528cc61d0
SHA512fabedc4cad6c9160b42f60ca065573198500478c4d3263bcf1819e6fc63b64be859760462257eabec7b9b2a2e1b971684166e09e9dc6742321cdfefc61e8c022
-
Filesize
224KB
MD5632b90d20b75e5032a9a3c477dd62c15
SHA1e35cd7926f5a322afccb5a7e6fc15d90cb1f4df5
SHA2562b587ea9effc71ec0fbe033c8d419f23cbf186627ff9fe21188c76d528cc61d0
SHA512fabedc4cad6c9160b42f60ca065573198500478c4d3263bcf1819e6fc63b64be859760462257eabec7b9b2a2e1b971684166e09e9dc6742321cdfefc61e8c022