Analysis
-
max time kernel
203s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe
Resource
win10v2004-20221111-en
General
-
Target
aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe
-
Size
200KB
-
MD5
0166573c66284a670ebf7364dd185974
-
SHA1
ce4b5657877ae74ecf9a4b704c4c8842a7f2f322
-
SHA256
aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574
-
SHA512
405e5aabf294a3f031347b110e12771ae73d81c010ef884fd22fcb9b818bfcbcb8715a09ca91dba7da948c2ffe4b9a7216afeb3b60e0d93478a41f83dd040b42
-
SSDEEP
6144:jmxepWymPBeaSAOJ+7xi5eRed63qaCR8nIBKa:yxiLmPBeaSAOJ+7xi5eRed63qaCD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woailen.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 woailen.exe -
Loads dropped DLL 2 IoCs
pid Process 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe -
Adds Run key to start application 2 TTPs 47 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /N" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /v" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /L" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /A" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /k" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /h" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /H" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /g" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /w" woailen.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /t" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /s" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /E" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /p" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /m" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /a" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /D" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /n" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /P" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /U" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /r" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /b" woailen.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /V" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /X" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /B" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /T" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /c" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /K" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /d" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /S" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /I" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /C" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /l" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /e" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /u" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /x" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /q" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /F" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /Z" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /M" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /Y" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /E" aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /W" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /R" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /O" woailen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\woailen = "C:\\Users\\Admin\\woailen.exe /z" woailen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe 2024 woailen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 2024 woailen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2024 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 28 PID 1300 wrote to memory of 2024 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 28 PID 1300 wrote to memory of 2024 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 28 PID 1300 wrote to memory of 2024 1300 aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe"C:\Users\Admin\AppData\Local\Temp\aa7dc64bfbd68141c4085daf6a3eb2d32242640974e12f1a56a862c295916574.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\woailen.exe"C:\Users\Admin\woailen.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD596b42534ded19738e8a0945305dc99b3
SHA1f3cd9261de11116e14e386678358b76ab9496339
SHA25601338931e5f9b5f518263bde13a4874effe157caffb75ae9f65d8c9c507f4650
SHA512d3f323c3c1f0308ba048d21e546235147076ddb0e7e4d09b30754e24dcb6570a68310934dd4ed3568809c82a5ae57ae551228cd771a159248892faabf2ff9d38
-
Filesize
200KB
MD596b42534ded19738e8a0945305dc99b3
SHA1f3cd9261de11116e14e386678358b76ab9496339
SHA25601338931e5f9b5f518263bde13a4874effe157caffb75ae9f65d8c9c507f4650
SHA512d3f323c3c1f0308ba048d21e546235147076ddb0e7e4d09b30754e24dcb6570a68310934dd4ed3568809c82a5ae57ae551228cd771a159248892faabf2ff9d38
-
Filesize
200KB
MD596b42534ded19738e8a0945305dc99b3
SHA1f3cd9261de11116e14e386678358b76ab9496339
SHA25601338931e5f9b5f518263bde13a4874effe157caffb75ae9f65d8c9c507f4650
SHA512d3f323c3c1f0308ba048d21e546235147076ddb0e7e4d09b30754e24dcb6570a68310934dd4ed3568809c82a5ae57ae551228cd771a159248892faabf2ff9d38
-
Filesize
200KB
MD596b42534ded19738e8a0945305dc99b3
SHA1f3cd9261de11116e14e386678358b76ab9496339
SHA25601338931e5f9b5f518263bde13a4874effe157caffb75ae9f65d8c9c507f4650
SHA512d3f323c3c1f0308ba048d21e546235147076ddb0e7e4d09b30754e24dcb6570a68310934dd4ed3568809c82a5ae57ae551228cd771a159248892faabf2ff9d38