Analysis
-
max time kernel
155s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:29
Static task
static1
Behavioral task
behavioral1
Sample
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe
Resource
win10v2004-20220812-en
General
-
Target
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe
-
Size
140KB
-
MD5
271b8920e3ec5ade31bef4126c0791e2
-
SHA1
929fcb36787fcfd962714dcd4af5b034accb782c
-
SHA256
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad
-
SHA512
e439e78e4543c8c512f52d09a92c5a8d97fd37154b72850be23a8ed9b5ca699f02dfc2e359f76b87fab9b91ff4ccbc8652c2ebb7414e3327cae3034c72e57b05
-
SSDEEP
768:zHMwyVyt4pd04q0zik+vhy7g0EM/LinbQ+d1:roeEn3+pCg0EUGQ+d1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
raaemac.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raaemac.exe -
Executes dropped EXE 1 IoCs
Processes:
raaemac.exepid process 1976 raaemac.exe -
Loads dropped DLL 2 IoCs
Processes:
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exepid process 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe -
Adds Run key to start application 2 TTPs 51 IoCs
Processes:
raaemac.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /c" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /q" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /H" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /T" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /v" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /U" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /Q" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /S" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /x" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /M" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /o" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /E" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /G" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /F" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /p" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /e" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /y" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /Z" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /A" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /R" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /m" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /K" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /W" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /P" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /n" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /l" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /I" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /C" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /r" raaemac.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /u" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /Y" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /g" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /N" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /V" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /L" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /s" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /O" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /B" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /h" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /t" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /J" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /z" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /D" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /j" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /i" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /d" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /b" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /f" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /a" raaemac.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\raaemac = "C:\\Users\\Admin\\raaemac.exe /X" raaemac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
raaemac.exepid process 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe 1976 raaemac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exeraaemac.exepid process 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe 1976 raaemac.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exeraaemac.exedescription pid process target process PID 288 wrote to memory of 1976 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe raaemac.exe PID 288 wrote to memory of 1976 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe raaemac.exe PID 288 wrote to memory of 1976 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe raaemac.exe PID 288 wrote to memory of 1976 288 c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe raaemac.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe PID 1976 wrote to memory of 288 1976 raaemac.exe c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe"C:\Users\Admin\AppData\Local\Temp\c43da8aa253b20b3b9b2d646995634f41b7b5d0b013899096dfe8d48b4b4e5ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\raaemac.exe"C:\Users\Admin\raaemac.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD550831b1be0da8dcb23d7c4b7d372bc6b
SHA1bee2dae1aeec87913a75a753b39a756f821cda7f
SHA25600e210966f46f7cf4ce446a22c36812ba8ea663e4ebb1c466323a8b7e133e910
SHA512296510d298e23b9e698d8f054c34faf5a26546bafe1fbc64de4bef7e950900bbd98c83d1cfc1d4b3518956a3873e63b0016f7f3dc0208915f73b29831277f829
-
Filesize
140KB
MD550831b1be0da8dcb23d7c4b7d372bc6b
SHA1bee2dae1aeec87913a75a753b39a756f821cda7f
SHA25600e210966f46f7cf4ce446a22c36812ba8ea663e4ebb1c466323a8b7e133e910
SHA512296510d298e23b9e698d8f054c34faf5a26546bafe1fbc64de4bef7e950900bbd98c83d1cfc1d4b3518956a3873e63b0016f7f3dc0208915f73b29831277f829
-
Filesize
140KB
MD550831b1be0da8dcb23d7c4b7d372bc6b
SHA1bee2dae1aeec87913a75a753b39a756f821cda7f
SHA25600e210966f46f7cf4ce446a22c36812ba8ea663e4ebb1c466323a8b7e133e910
SHA512296510d298e23b9e698d8f054c34faf5a26546bafe1fbc64de4bef7e950900bbd98c83d1cfc1d4b3518956a3873e63b0016f7f3dc0208915f73b29831277f829
-
Filesize
140KB
MD550831b1be0da8dcb23d7c4b7d372bc6b
SHA1bee2dae1aeec87913a75a753b39a756f821cda7f
SHA25600e210966f46f7cf4ce446a22c36812ba8ea663e4ebb1c466323a8b7e133e910
SHA512296510d298e23b9e698d8f054c34faf5a26546bafe1fbc64de4bef7e950900bbd98c83d1cfc1d4b3518956a3873e63b0016f7f3dc0208915f73b29831277f829