Analysis
-
max time kernel
242s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
Resource
win10v2004-20221111-en
General
-
Target
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
-
Size
84KB
-
MD5
0ae04f2e6d3dd30f65baed0d0869d7b4
-
SHA1
1c95880e934fce5cbeb8453059cb082c860b738a
-
SHA256
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12
-
SHA512
3c7605d462c3cee67f9aa72fdd13073da823bead4de5bddc1cbdf719f133c851d52b99b17a7c4fa2eaddab39cb925c745a734ce04d8b6d99a044ca27c9d1b81a
-
SSDEEP
768:DyV+hOvogEwzpbgJyGE5NIWi3KEyUhL7b7Yqlf4JwQltjmtTBHi7Al+:DoFv9p1rC76Ezh/vYlJwAitTB3l+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tioum.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tioum.exe -
Executes dropped EXE 1 IoCs
Processes:
tioum.exepid process 1156 tioum.exe -
Loads dropped DLL 2 IoCs
Processes:
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exepid process 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tioum.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tioum.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\tioum = "C:\\Users\\Admin\\tioum.exe" tioum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1664 368 WerFault.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tioum.exepid process 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe 1156 tioum.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exetioum.exepid process 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe 1156 tioum.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exetioum.exedescription pid process target process PID 368 wrote to memory of 1156 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe tioum.exe PID 368 wrote to memory of 1156 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe tioum.exe PID 368 wrote to memory of 1156 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe tioum.exe PID 368 wrote to memory of 1156 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe tioum.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 368 wrote to memory of 1664 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe WerFault.exe PID 368 wrote to memory of 1664 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe WerFault.exe PID 368 wrote to memory of 1664 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe WerFault.exe PID 368 wrote to memory of 1664 368 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 1664 1156 tioum.exe WerFault.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 1156 wrote to memory of 368 1156 tioum.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe"C:\Users\Admin\AppData\Local\Temp\a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\tioum.exe"C:\Users\Admin\tioum.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 8202⤵
- Program crash
PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD53920c67613ffd376d68e70d2376e009b
SHA1adf1bd8bf51046a4fb2f7925f786b085b6eb2928
SHA256e8a0357b413defd47dd6526aab233180f1b36ca77bf2aada30fc14366a78bfc2
SHA5126e987fac2d1cc6836e82db4be3537d4b8d10a732c8f79960324626280d25a28e9d5451579fecab46874d78e00bef2848a3123d688ded9b87e54524ca279075d0
-
Filesize
84KB
MD53920c67613ffd376d68e70d2376e009b
SHA1adf1bd8bf51046a4fb2f7925f786b085b6eb2928
SHA256e8a0357b413defd47dd6526aab233180f1b36ca77bf2aada30fc14366a78bfc2
SHA5126e987fac2d1cc6836e82db4be3537d4b8d10a732c8f79960324626280d25a28e9d5451579fecab46874d78e00bef2848a3123d688ded9b87e54524ca279075d0
-
Filesize
84KB
MD53920c67613ffd376d68e70d2376e009b
SHA1adf1bd8bf51046a4fb2f7925f786b085b6eb2928
SHA256e8a0357b413defd47dd6526aab233180f1b36ca77bf2aada30fc14366a78bfc2
SHA5126e987fac2d1cc6836e82db4be3537d4b8d10a732c8f79960324626280d25a28e9d5451579fecab46874d78e00bef2848a3123d688ded9b87e54524ca279075d0
-
Filesize
84KB
MD53920c67613ffd376d68e70d2376e009b
SHA1adf1bd8bf51046a4fb2f7925f786b085b6eb2928
SHA256e8a0357b413defd47dd6526aab233180f1b36ca77bf2aada30fc14366a78bfc2
SHA5126e987fac2d1cc6836e82db4be3537d4b8d10a732c8f79960324626280d25a28e9d5451579fecab46874d78e00bef2848a3123d688ded9b87e54524ca279075d0