Analysis
-
max time kernel
150s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe
Resource
win10v2004-20220812-en
General
-
Target
b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe
-
Size
204KB
-
MD5
f7e04f304a462a84327cce14529eaab0
-
SHA1
ef42bc5c3f7739eb520aa4d21a18f280d339d69a
-
SHA256
b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298
-
SHA512
a27a865e3b3232b89e53d7e36d38ff42710234570e7e66bfe11751a3ce999b373ad1a87c801a9c1a5d68625fc813deeeb89f3a5f49862a83cb646babda270dd0
-
SSDEEP
3072:NH300tQ9nLHbB9W+U1TqEYzR/mkSYGrl9ymgYUWu9S:NX04QxL7B9W+U1RYzR/fSmlA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dibiq.exe -
Executes dropped EXE 1 IoCs
pid Process 1924 dibiq.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /b" b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /a" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /b" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /i" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /c" dibiq.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /g" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /s" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /r" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /x" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /e" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /t" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /o" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /n" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /w" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /z" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /y" dibiq.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /q" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /p" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /d" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /f" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /l" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /j" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /k" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /u" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /h" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /m" dibiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dibiq = "C:\\Users\\Admin\\dibiq.exe /v" dibiq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe 1924 dibiq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 1924 dibiq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1924 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 27 PID 1228 wrote to memory of 1924 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 27 PID 1228 wrote to memory of 1924 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 27 PID 1228 wrote to memory of 1924 1228 b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe"C:\Users\Admin\AppData\Local\Temp\b4cfd39d754df3eb7c6e44b9bc929bda33946f541558b4f24a7b31baf404d298.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\dibiq.exe"C:\Users\Admin\dibiq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5aed988d4a194d6e69b1c3b44668344ce
SHA1907f2b478e8dd48baf848461c595d3b03fad29e6
SHA256be9bab22d5ef4095c49c7744db70661506372d62bad8d924079cd4a076b21dbc
SHA512b3428db1100a39d6633613c8649dae143020caf71e561a324618abc2e15a93b2da76b927c7816a8360c19cc065b43118743fda206cf457744a550265a4edf023
-
Filesize
204KB
MD5aed988d4a194d6e69b1c3b44668344ce
SHA1907f2b478e8dd48baf848461c595d3b03fad29e6
SHA256be9bab22d5ef4095c49c7744db70661506372d62bad8d924079cd4a076b21dbc
SHA512b3428db1100a39d6633613c8649dae143020caf71e561a324618abc2e15a93b2da76b927c7816a8360c19cc065b43118743fda206cf457744a550265a4edf023
-
Filesize
204KB
MD5aed988d4a194d6e69b1c3b44668344ce
SHA1907f2b478e8dd48baf848461c595d3b03fad29e6
SHA256be9bab22d5ef4095c49c7744db70661506372d62bad8d924079cd4a076b21dbc
SHA512b3428db1100a39d6633613c8649dae143020caf71e561a324618abc2e15a93b2da76b927c7816a8360c19cc065b43118743fda206cf457744a550265a4edf023
-
Filesize
204KB
MD5aed988d4a194d6e69b1c3b44668344ce
SHA1907f2b478e8dd48baf848461c595d3b03fad29e6
SHA256be9bab22d5ef4095c49c7744db70661506372d62bad8d924079cd4a076b21dbc
SHA512b3428db1100a39d6633613c8649dae143020caf71e561a324618abc2e15a93b2da76b927c7816a8360c19cc065b43118743fda206cf457744a550265a4edf023