Analysis
-
max time kernel
228s -
max time network
204s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 17:28
Static task
static1
Behavioral task
behavioral1
Sample
91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe
Resource
win10v2004-20220901-en
General
-
Target
91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe
-
Size
204KB
-
MD5
afb9d66f14c88f71d51e0d0049757cd7
-
SHA1
b9adeee395b3a97899a62ad722c4ff140b57599d
-
SHA256
91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62
-
SHA512
16ef8377e2cbdf389293bbf31c85b27eea67f3798f03daebfcbb928d5faf99f10665aa7ac7f23213ea9de2af3c3f3ffc6c3ce20a276974805eb021b33f4bdec1
-
SSDEEP
3072:Im4W8t80tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUW/5:TN14QxL7B9W0c1RCzR/fSmlE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faaroof.exe -
Executes dropped EXE 1 IoCs
pid Process 1524 faaroof.exe -
Loads dropped DLL 2 IoCs
pid Process 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /b" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /p" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /o" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /v" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /l" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /f" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /n" faaroof.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /a" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /e" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /t" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /w" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /u" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /i" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /k" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /c" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /d" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /g" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /r" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /m" 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /j" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /m" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /h" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /y" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /q" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /s" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /z" faaroof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\faaroof = "C:\\Users\\Admin\\faaroof.exe /x" faaroof.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe 1524 faaroof.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 1524 faaroof.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1524 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 28 PID 1944 wrote to memory of 1524 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 28 PID 1944 wrote to memory of 1524 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 28 PID 1944 wrote to memory of 1524 1944 91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe"C:\Users\Admin\AppData\Local\Temp\91fc592c93c331f82b0bddb0e03c867f860f32e91a40860e2367bb01241dad62.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\faaroof.exe"C:\Users\Admin\faaroof.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD59d2df6b4d63bdeba3431adf264a5bd37
SHA134abd9d79247cbfe9ded4340812bb04ce28f9cf9
SHA256e694ba2435a390ea47b7d8ef1654e0485e4903c73d2016fd908b97c35086a4fd
SHA512140b202759d3eb58794c6b46a9ea2953a71169bf5bd059d0a3517f78b92142e82493e94dd1f2c845dbce8bab691d7d03b8bbea4ea700ca9174e20fb9f66fbdd1
-
Filesize
204KB
MD59d2df6b4d63bdeba3431adf264a5bd37
SHA134abd9d79247cbfe9ded4340812bb04ce28f9cf9
SHA256e694ba2435a390ea47b7d8ef1654e0485e4903c73d2016fd908b97c35086a4fd
SHA512140b202759d3eb58794c6b46a9ea2953a71169bf5bd059d0a3517f78b92142e82493e94dd1f2c845dbce8bab691d7d03b8bbea4ea700ca9174e20fb9f66fbdd1
-
Filesize
204KB
MD59d2df6b4d63bdeba3431adf264a5bd37
SHA134abd9d79247cbfe9ded4340812bb04ce28f9cf9
SHA256e694ba2435a390ea47b7d8ef1654e0485e4903c73d2016fd908b97c35086a4fd
SHA512140b202759d3eb58794c6b46a9ea2953a71169bf5bd059d0a3517f78b92142e82493e94dd1f2c845dbce8bab691d7d03b8bbea4ea700ca9174e20fb9f66fbdd1
-
Filesize
204KB
MD59d2df6b4d63bdeba3431adf264a5bd37
SHA134abd9d79247cbfe9ded4340812bb04ce28f9cf9
SHA256e694ba2435a390ea47b7d8ef1654e0485e4903c73d2016fd908b97c35086a4fd
SHA512140b202759d3eb58794c6b46a9ea2953a71169bf5bd059d0a3517f78b92142e82493e94dd1f2c845dbce8bab691d7d03b8bbea4ea700ca9174e20fb9f66fbdd1