Analysis
-
max time kernel
181s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe
Resource
win10v2004-20221111-en
General
-
Target
8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe
-
Size
152KB
-
MD5
665eebf4fe220b60f534c8b316737122
-
SHA1
4503cca0ede799cab0dc198ad0a61c1afcadf85b
-
SHA256
8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065
-
SHA512
ab88f76208288b032a3a5dfbed29281a012e6785a8965044efc0c9b64dca97a7690feb5040be7d2dff289a12c349031709f06b5f04440f1f5a1048283e4e4fea
-
SSDEEP
3072:T0IVE1vtR13FmnmpF+CkvMnQIKAWNBlU/XBq6ci:gI61FR1OmpF+CkvMYcFci
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seairo.exe -
Executes dropped EXE 1 IoCs
pid Process 3132 seairo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe -
Adds Run key to start application 2 TTPs 23 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /c" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /p" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /e" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /w" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /x" seairo.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /m" 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /i" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /h" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /a" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /r" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /b" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /g" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /q" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /u" seairo.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /k" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /j" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /y" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /f" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /o" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /s" seairo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seairo = "C:\\Users\\Admin\\seairo.exe /z" seairo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4036 3144 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3144 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe 3144 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe 3132 seairo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3144 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe 3132 seairo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 3132 3144 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe 84 PID 3144 wrote to memory of 3132 3144 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe 84 PID 3144 wrote to memory of 3132 3144 8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe"C:\Users\Admin\AppData\Local\Temp\8256b692a321829ebf437f3e9b97cc9676e07f3e7741853d88eb3e3c21799065.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\seairo.exe"C:\Users\Admin\seairo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 15722⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3144 -ip 31441⤵PID:4492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5d361501c732162481222782bf2561397
SHA1b8c43fe6b81a2df483c8a4f6c5960c38a8d99d72
SHA256c7df6265795612485d5c99915788c344159f9ec7357ac3ce5853293079951596
SHA5123584aec52cec126c109a2d23c1a2cbf7477ae742a9c60dcaf9e14467958544fbbc76c4861928fef42a6dcd729cfc495356d5c2507a9851656a72f288eea36c83
-
Filesize
152KB
MD5d361501c732162481222782bf2561397
SHA1b8c43fe6b81a2df483c8a4f6c5960c38a8d99d72
SHA256c7df6265795612485d5c99915788c344159f9ec7357ac3ce5853293079951596
SHA5123584aec52cec126c109a2d23c1a2cbf7477ae742a9c60dcaf9e14467958544fbbc76c4861928fef42a6dcd729cfc495356d5c2507a9851656a72f288eea36c83