Analysis
-
max time kernel
257s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 02:06
Static task
static1
Behavioral task
behavioral1
Sample
15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe
Resource
win10v2004-20220901-en
General
-
Target
15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe
-
Size
272KB
-
MD5
68f8cdab7dd87128507520dd35387736
-
SHA1
3a8eb6347446e1f1c912c46bf438dd707a9d85a6
-
SHA256
15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c
-
SHA512
cf21f227467c73af52930f9c5e68019b5894459439c2e0eba75f964dc266c5a3830b153a7369857441d7c7cdd89d65ae1003fe6b16c00b0f774fbe1624ad3151
-
SSDEEP
3072:NRyM68NgtWHzaqBtmKOqNRkQUG7opA83KPj/1yBFfJp1m:TyM6yHt66i3pAGKPj/1yB9j1m
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svqeiy.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 svqeiy.exe -
Loads dropped DLL 2 IoCs
pid Process 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /g" 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /r" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /v" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /i" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /e" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /z" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /a" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /x" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /p" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /q" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /b" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /s" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /g" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /k" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /c" svqeiy.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ svqeiy.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /d" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /l" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /h" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /t" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /f" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /n" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /j" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /u" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /o" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /m" svqeiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svqeiy = "C:\\Users\\Admin\\svqeiy.exe /w" svqeiy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe 1984 svqeiy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 1984 svqeiy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 564 wrote to memory of 1984 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 28 PID 564 wrote to memory of 1984 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 28 PID 564 wrote to memory of 1984 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 28 PID 564 wrote to memory of 1984 564 15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe"C:\Users\Admin\AppData\Local\Temp\15daea6f00191a6fafd7dc8692669252c4e1080e548c1971dc68edc4c319a84c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\svqeiy.exe"C:\Users\Admin\svqeiy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5c34957240ce5ac4d457f74e58878d760
SHA1364e6b043d2750591d07a6dbd9f1bff21a26e19a
SHA25645cc925ba5a5825402ea83854f899746d1e7f1c311d8ad655ac2122269a67f80
SHA51271e425060a1c73d6458a7fa753421486d6c8f34b7cab8cec2452878b01430146526b3e1eed3888ca9cfedce275da000715b3bca8f140d30914c7a0fc19b7f9f5
-
Filesize
272KB
MD5c34957240ce5ac4d457f74e58878d760
SHA1364e6b043d2750591d07a6dbd9f1bff21a26e19a
SHA25645cc925ba5a5825402ea83854f899746d1e7f1c311d8ad655ac2122269a67f80
SHA51271e425060a1c73d6458a7fa753421486d6c8f34b7cab8cec2452878b01430146526b3e1eed3888ca9cfedce275da000715b3bca8f140d30914c7a0fc19b7f9f5
-
Filesize
272KB
MD5c34957240ce5ac4d457f74e58878d760
SHA1364e6b043d2750591d07a6dbd9f1bff21a26e19a
SHA25645cc925ba5a5825402ea83854f899746d1e7f1c311d8ad655ac2122269a67f80
SHA51271e425060a1c73d6458a7fa753421486d6c8f34b7cab8cec2452878b01430146526b3e1eed3888ca9cfedce275da000715b3bca8f140d30914c7a0fc19b7f9f5
-
Filesize
272KB
MD5c34957240ce5ac4d457f74e58878d760
SHA1364e6b043d2750591d07a6dbd9f1bff21a26e19a
SHA25645cc925ba5a5825402ea83854f899746d1e7f1c311d8ad655ac2122269a67f80
SHA51271e425060a1c73d6458a7fa753421486d6c8f34b7cab8cec2452878b01430146526b3e1eed3888ca9cfedce275da000715b3bca8f140d30914c7a0fc19b7f9f5