Analysis
-
max time kernel
106s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:22
Static task
static1
Behavioral task
behavioral1
Sample
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe
Resource
win10v2004-20220812-en
General
-
Target
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe
-
Size
284KB
-
MD5
16545ed81a2a78159ff6817af2af6204
-
SHA1
d33c3d01ff1ff54d59aee92241f71416f07deb0f
-
SHA256
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
-
SHA512
160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5
-
SSDEEP
6144:tZtIRD1t1aZMIvEl0E9/DIVpgAXL0LedMWs4QNJdaGcGGZ0GbNXht+6h0SItIBjp:tZtIRD71aZMIvEl0E9/DIVpgAXL0LedD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exeroarey.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roarey.exe -
Executes dropped EXE 1 IoCs
Processes:
roarey.exepid process 4936 roarey.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe -
Adds Run key to start application 2 TTPs 25 IoCs
Processes:
roarey.exe394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /c" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /i" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /e" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /m" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /f" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /o" roarey.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /u" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /k" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /j" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /f" 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /x" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /n" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /y" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /v" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /s" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /t" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /q" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /r" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /a" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /g" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /z" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /w" roarey.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roarey = "C:\\Users\\Admin\\roarey.exe /p" roarey.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
roarey.exe394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 roarey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum roarey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exeroarey.exepid process 1672 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe 1672 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe 4936 roarey.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exeroarey.exepid process 1672 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe 4936 roarey.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription pid process target process PID 1672 wrote to memory of 4936 1672 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe roarey.exe PID 1672 wrote to memory of 4936 1672 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe roarey.exe PID 1672 wrote to memory of 4936 1672 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe roarey.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe"C:\Users\Admin\AppData\Local\Temp\394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\roarey.exe"C:\Users\Admin\roarey.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD516545ed81a2a78159ff6817af2af6204
SHA1d33c3d01ff1ff54d59aee92241f71416f07deb0f
SHA256394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
SHA512160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5
-
Filesize
284KB
MD516545ed81a2a78159ff6817af2af6204
SHA1d33c3d01ff1ff54d59aee92241f71416f07deb0f
SHA256394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
SHA512160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5