Analysis
-
max time kernel
155s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe
Resource
win10v2004-20221111-en
General
-
Target
f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe
-
Size
140KB
-
MD5
178f314f1004b04ef0ce2924b4a1a1c0
-
SHA1
6c791603abb2263bd46352cf49237ad5df3d5eda
-
SHA256
f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004
-
SHA512
a402e1a2e9f3b923d11f05163b0f693393c187bdb87057e3a29ebd46f7a389233b33aee1fec0b9b058e04523453eb3a84b0a43246b9e8c70c6006dd445a324bf
-
SSDEEP
1536:i6L0GBgh7rdkhVJXMFoyjHqvd50bbqemC/+onbQTM8rPN81ZNN2N2eeAUb9HtWjX:i6CSmieHMIrBEPN81ZNNi5ePV15m
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeion.exe -
Executes dropped EXE 2 IoCs
pid Process 4352 jeion.exe 572 jeion.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /x" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /r" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /u" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /m" jeion.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /t" f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /j" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /e" jeion.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /q" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /g" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /c" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /a" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /z" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /h" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /b" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /o" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /k" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /w" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /f" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /l" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /v" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /n" jeion.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeion = "C:\\Users\\Admin\\jeion.exe /s" jeion.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum jeion.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 jeion.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf jeion.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 860 set thread context of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 4352 set thread context of 572 4352 jeion.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 4912 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe 572 jeion.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 4912 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 4352 jeion.exe 572 jeion.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 860 wrote to memory of 4912 860 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 83 PID 4912 wrote to memory of 4352 4912 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 86 PID 4912 wrote to memory of 4352 4912 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 86 PID 4912 wrote to memory of 4352 4912 f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe 86 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88 PID 4352 wrote to memory of 572 4352 jeion.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe"C:\Users\Admin\AppData\Local\Temp\f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004.exe712⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\jeion.exe"C:\Users\Admin\jeion.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\jeion.exe714⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:572
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5178f314f1004b04ef0ce2924b4a1a1c0
SHA16c791603abb2263bd46352cf49237ad5df3d5eda
SHA256f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004
SHA512a402e1a2e9f3b923d11f05163b0f693393c187bdb87057e3a29ebd46f7a389233b33aee1fec0b9b058e04523453eb3a84b0a43246b9e8c70c6006dd445a324bf
-
Filesize
140KB
MD5178f314f1004b04ef0ce2924b4a1a1c0
SHA16c791603abb2263bd46352cf49237ad5df3d5eda
SHA256f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004
SHA512a402e1a2e9f3b923d11f05163b0f693393c187bdb87057e3a29ebd46f7a389233b33aee1fec0b9b058e04523453eb3a84b0a43246b9e8c70c6006dd445a324bf
-
Filesize
140KB
MD5178f314f1004b04ef0ce2924b4a1a1c0
SHA16c791603abb2263bd46352cf49237ad5df3d5eda
SHA256f50e963b0bd1300364f08decebdb2fd39dcb80fb1626db6f9dc13a94801c2004
SHA512a402e1a2e9f3b923d11f05163b0f693393c187bdb87057e3a29ebd46f7a389233b33aee1fec0b9b058e04523453eb3a84b0a43246b9e8c70c6006dd445a324bf