Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe
Resource
win10v2004-20220901-en
General
-
Target
7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe
-
Size
212KB
-
MD5
5cd215f6e307bfb3b0fff1c4be3ff450
-
SHA1
f06f323e574395380231a10a8d5768f33a3f10e3
-
SHA256
7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040
-
SHA512
481e8663a792edc524922e5794fec03136be218549e15ba0671dd5660b901dd59ca60a971cccbe52566f0e9cb04dd1df67013fc54a6b4a37840b83c21e7a4c93
-
SSDEEP
6144:+hFFwlPelKiAzY09umHh7K5cUXEBwrYVHhAgz65c2:GFaxelKhY09umH45cUXEBwUVHhAgz65p
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seimem.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 seimem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /j" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /l" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /w" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /d" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /g" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /u" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /r" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /w" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /b" seimem.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /s" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /i" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /n" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /h" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /a" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /m" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /v" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /v" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /g" 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /h" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /f" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /q" seimem.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /y" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /l" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /k" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /p" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /x" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /z" seimem.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /b" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /o" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /z" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /d" 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /f" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /n" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /p" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /o" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /i" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /s" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /y" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /c" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /m" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /t" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /q" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /j" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /a" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /e" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /e" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /t" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /k" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /c" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /u" seimem.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /r" seimem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /x" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /d" seimem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seimem = "C:\\Users\\Admin\\seimem.exe /g" seimem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe 2552 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe 4812 seimem.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4812 seimem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe 4812 seimem.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2552 wrote to memory of 4812 2552 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe 80 PID 2552 wrote to memory of 4812 2552 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe 80 PID 2552 wrote to memory of 4812 2552 7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe"C:\Users\Admin\AppData\Local\Temp\7e7cd311f6f5cf4528c9b0856a010f5b0d0606d65e0000fe61ddf681af95f040.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\seimem.exe"C:\Users\Admin\seimem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD534d9fab32da5bcb626fad03d49c76d48
SHA12a73a3d6ed7d1625c24babf7e9c2fb0c887320f1
SHA25601aa36f1ecf629337266bb525fbc473c8a0a134227c3677747f86554867b2a6f
SHA51251c390713343ccf738b278a66f558b13184d46f1219f314e410ee4bff5f1c9f0fe9c42ea41879a0c3af9f8ac9783bdee817437eabc108c62b5a688626d1bee4b
-
Filesize
212KB
MD534d9fab32da5bcb626fad03d49c76d48
SHA12a73a3d6ed7d1625c24babf7e9c2fb0c887320f1
SHA25601aa36f1ecf629337266bb525fbc473c8a0a134227c3677747f86554867b2a6f
SHA51251c390713343ccf738b278a66f558b13184d46f1219f314e410ee4bff5f1c9f0fe9c42ea41879a0c3af9f8ac9783bdee817437eabc108c62b5a688626d1bee4b