Analysis
-
max time kernel
291s -
max time network
341s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe
Resource
win10v2004-20221111-en
General
-
Target
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe
-
Size
252KB
-
MD5
0539065b43e4e75d5e100593dd034f36
-
SHA1
bb173ebb6ebd0c1d47215c78647a539a70526632
-
SHA256
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9
-
SHA512
d7d293c47862adf0f2789cd22304340cb7ca6db495883bac99e515941825b76abb04ca7cb637cc062d4c869594b778d81266eaab7d51bee5c55e80b437f38d21
-
SSDEEP
6144:Orh0e5rhVz84rjL1/gq0n74Gp+QFbLVBvOP+c+EdMUutF:+h0KrhK4rjL1/gq0n74Gp+QFbLV0+RUa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exepiepeoh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" piepeoh.exe -
Executes dropped EXE 1 IoCs
Processes:
piepeoh.exepid process 2920 piepeoh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe -
Adds Run key to start application 2 TTPs 36 IoCs
Processes:
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exepiepeoh.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /e" b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /j" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /n" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /w" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /b" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /d" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /q" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /L" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /f" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /S" piepeoh.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /K" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /g" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /l" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /J" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /s" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /M" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /B" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /R" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /D" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /x" piepeoh.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /H" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /F" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /t" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /y" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /Q" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /N" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /u" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /i" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /E" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /p" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /h" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /v" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /O" piepeoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piepeoh = "C:\\Users\\Admin\\piepeoh.exe /U" piepeoh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exepiepeoh.exepid process 3760 b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe 3760 b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe 2920 piepeoh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exepiepeoh.exepid process 3760 b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe 2920 piepeoh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exedescription pid process target process PID 3760 wrote to memory of 2920 3760 b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe piepeoh.exe PID 3760 wrote to memory of 2920 3760 b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe piepeoh.exe PID 3760 wrote to memory of 2920 3760 b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe piepeoh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe"C:\Users\Admin\AppData\Local\Temp\b8628cd175e73fe1d8d51f0b15b4389b78dd12a2eb9ae8fdd286c11ca7cf43e9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\piepeoh.exe"C:\Users\Admin\piepeoh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD50f241074de96601d254da8f5d57d804b
SHA1f4f1b3786fafce55a507d7c0c2f92ceead94c1c3
SHA256650ddb97fa1003b3e75b7e1ae5548b5ce76ac9f98b3bdece7be359bd6bc1ea55
SHA512a428157e75bd07df890cd727cba19b2d1bc2cb0d48d9ed015469bbc8ebfd2bff34359cf326dfd26eb6d543079a6f28421fa7289e44d4ee33bc1869b3b38f8761
-
Filesize
252KB
MD50f241074de96601d254da8f5d57d804b
SHA1f4f1b3786fafce55a507d7c0c2f92ceead94c1c3
SHA256650ddb97fa1003b3e75b7e1ae5548b5ce76ac9f98b3bdece7be359bd6bc1ea55
SHA512a428157e75bd07df890cd727cba19b2d1bc2cb0d48d9ed015469bbc8ebfd2bff34359cf326dfd26eb6d543079a6f28421fa7289e44d4ee33bc1869b3b38f8761