Analysis
-
max time kernel
180s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
Resource
win10v2004-20221111-en
General
-
Target
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe
-
Size
84KB
-
MD5
0ae04f2e6d3dd30f65baed0d0869d7b4
-
SHA1
1c95880e934fce5cbeb8453059cb082c860b738a
-
SHA256
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12
-
SHA512
3c7605d462c3cee67f9aa72fdd13073da823bead4de5bddc1cbdf719f133c851d52b99b17a7c4fa2eaddab39cb925c745a734ce04d8b6d99a044ca27c9d1b81a
-
SSDEEP
768:DyV+hOvogEwzpbgJyGE5NIWi3KEyUhL7b7Yqlf4JwQltjmtTBHi7Al+:DoFv9p1rC76Ezh/vYlJwAitTB3l+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
fieti.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fieti.exe -
Executes dropped EXE 1 IoCs
Processes:
fieti.exepid process 888 fieti.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fieti.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fieti.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fieti = "C:\\Users\\Admin\\fieti.exe" fieti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3028 4400 WerFault.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fieti.exepid process 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe 888 fieti.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exefieti.exepid process 4400 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe 888 fieti.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exefieti.exedescription pid process target process PID 4400 wrote to memory of 888 4400 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe fieti.exe PID 4400 wrote to memory of 888 4400 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe fieti.exe PID 4400 wrote to memory of 888 4400 a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe fieti.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 4400 888 fieti.exe a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe PID 888 wrote to memory of 3028 888 fieti.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe"C:\Users\Admin\AppData\Local\Temp\a56eebd04e0176a36775c0f9644e786c5c30576e1ed36ef989214081bb111f12.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\fieti.exe"C:\Users\Admin\fieti.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 15042⤵
- Program crash
PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4400 -ip 44001⤵PID:2544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD55c15dcafa18cf7ed473413aef6c21a57
SHA10561ce5e749a703985a72841f87318cc1c16028e
SHA2560f4ea7c52b89fc640d8ae01b838730fea924619d0f870aba7084fa8ace0dab26
SHA512ec903bdb22c2c29b0715f92268a598580ff2213c9074aefd6da805932248706e1db4a8dd0c82e977d7871fd24d3ade4fc8c9b090e54e5f5f409034d72161bb66
-
Filesize
84KB
MD55c15dcafa18cf7ed473413aef6c21a57
SHA10561ce5e749a703985a72841f87318cc1c16028e
SHA2560f4ea7c52b89fc640d8ae01b838730fea924619d0f870aba7084fa8ace0dab26
SHA512ec903bdb22c2c29b0715f92268a598580ff2213c9074aefd6da805932248706e1db4a8dd0c82e977d7871fd24d3ade4fc8c9b090e54e5f5f409034d72161bb66