Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe
Resource
win10v2004-20220812-en
General
-
Target
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe
-
Size
184KB
-
MD5
1907174a1b2bd4185bab0ad3937dff80
-
SHA1
f68b09ddfef9fb833993599d64fb92c5e951c8c1
-
SHA256
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e
-
SHA512
2a5766f534010526b53a73061c8b09209c66ae66dc3660bb9679d72d6013768ae2db0e7dc88276dea0c2a3ae3c6f7e9c649cda9bf5fff6911f8f26b23c711980
-
SSDEEP
3072:yCTg+CWoYTzCh46Knvmb7/D26ytQlw/Lg5q69srijEgS36:OGpz6LKnvmb7/D26yQlw/Lg5qosriHSK
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exedeiyeep.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deiyeep.exe -
Executes dropped EXE 1 IoCs
Processes:
deiyeep.exepid process 1944 deiyeep.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
deiyeep.exe43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /u" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /K" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /C" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /N" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /L" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /A" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /b" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /M" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /v" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /Q" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /f" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /D" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /Z" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /d" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /q" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /n" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /t" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /S" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /J" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /s" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /V" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /R" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /p" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /T" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /G" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /w" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /H" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /i" deiyeep.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /E" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /g" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /W" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /P" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /m" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /B" 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /j" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /c" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /O" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /l" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /r" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /B" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /F" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /Y" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /y" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /a" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /o" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /U" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /h" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /z" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /k" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /e" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /x" deiyeep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deiyeep = "C:\\Users\\Admin\\deiyeep.exe /X" deiyeep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exedeiyeep.exepid process 2352 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe 2352 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe 1944 deiyeep.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exedeiyeep.exepid process 2352 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe 1944 deiyeep.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exedescription pid process target process PID 2352 wrote to memory of 1944 2352 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe deiyeep.exe PID 2352 wrote to memory of 1944 2352 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe deiyeep.exe PID 2352 wrote to memory of 1944 2352 43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe deiyeep.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe"C:\Users\Admin\AppData\Local\Temp\43926241e6e6087666292a6c71118fed465cdd06d7c0cb342cf5e6d573811d6e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\deiyeep.exe"C:\Users\Admin\deiyeep.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD58bdaac52218b66acf21625a686341e43
SHA16be10a81b147de9b9b4cbf25a53ee379edbc9e18
SHA256912cfdd4f0b7871f5b2c3be531dcfae03e65135e3a3d84148767070af854a702
SHA512cd34013ec1c0a350769cad92db82f2c48b0ff9554d16c6293bc4380e5488383b5399705eeb833439d9f143c6d2a59847b0a16139ec868c2f39d0da38592fcb5a
-
Filesize
184KB
MD58bdaac52218b66acf21625a686341e43
SHA16be10a81b147de9b9b4cbf25a53ee379edbc9e18
SHA256912cfdd4f0b7871f5b2c3be531dcfae03e65135e3a3d84148767070af854a702
SHA512cd34013ec1c0a350769cad92db82f2c48b0ff9554d16c6293bc4380e5488383b5399705eeb833439d9f143c6d2a59847b0a16139ec868c2f39d0da38592fcb5a