Analysis
-
max time kernel
115s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe
Resource
win10v2004-20220812-en
General
-
Target
8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe
-
Size
224KB
-
MD5
d31c81db17f8fc1309c7528925ec93db
-
SHA1
3a55ffcea1bd5a6f59e6c6f90a0f6c9a7d62a1a9
-
SHA256
8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363
-
SHA512
7d7980ce04f04c0db9aafd278a230a767292edeb211d74f4c22ab6af16b8147ea69366880d0a266df13b0e37cf9fb8f01bd25320f7d09b5f8d904b71e61d30c8
-
SSDEEP
3072:q788E5EEqiJAKMN9DAXamLKAcfbKyZwP02bVq3NZMf:qW54KMN9DtAcfbK/qT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe -
Executes dropped EXE 1 IoCs
pid Process 4188 baexe.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /c" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /v" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /c" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /r" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /a" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /s" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /g" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /a" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /e" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /h" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /k" baexe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /d" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /b" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /l" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /p" 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /g" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /r" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /z" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /y" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /i" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /x" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /l" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /e" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /p" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /n" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /x" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /y" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /f" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /b" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /t" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /q" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /j" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /h" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /u" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /m" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /i" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /m" baexe.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /k" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /u" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /z" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /v" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /o" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /b" 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /w" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /o" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /j" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /s" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /t" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /q" baexe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /n" baexe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /d" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /w" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /p" baexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baexe = "C:\\Users\\Admin\\baexe.exe /f" baexe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 556 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe 556 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe 4188 baexe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 556 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe 4188 baexe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 4188 556 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe 79 PID 556 wrote to memory of 4188 556 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe 79 PID 556 wrote to memory of 4188 556 8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe"C:\Users\Admin\AppData\Local\Temp\8951bcdc72c54d1d49428487c2c2ad7a6c785c3772c83f096ef35696e8bc9363.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\baexe.exe"C:\Users\Admin\baexe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4188
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d280f90888df42a7a4746f4c1fbcb938
SHA16f71a792e3d6d82c668dea2e74073027a049ff13
SHA256e9286e8968cf22f1f114c824fae13c8d12b8e975c1b0a1afbeff36361d3ea72f
SHA51280d570ad8dc03d09444b81c267b813acb7229f62e68cdc891eedd99be4f1f4ea44a2e9b600cca9963de9d0e600d55daca51e5612da67f7237bb6844ca495f8bf
-
Filesize
224KB
MD5d280f90888df42a7a4746f4c1fbcb938
SHA16f71a792e3d6d82c668dea2e74073027a049ff13
SHA256e9286e8968cf22f1f114c824fae13c8d12b8e975c1b0a1afbeff36361d3ea72f
SHA51280d570ad8dc03d09444b81c267b813acb7229f62e68cdc891eedd99be4f1f4ea44a2e9b600cca9963de9d0e600d55daca51e5612da67f7237bb6844ca495f8bf