Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe
Resource
win10v2004-20220812-en
General
-
Target
a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe
-
Size
164KB
-
MD5
5313f9c201fbaaf4be43d7d9e6249b89
-
SHA1
5cf30234ad84577a51c8f3e72c0eda5f778a198c
-
SHA256
a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29
-
SHA512
d4387c753268dffd8e79a0cecacb6881ae4d1271a30ba44b0efac0197dac75a33159a4038632443d49fd3a53f4cd479042c8a19b00592e76a677a3b643583b9c
-
SSDEEP
1536:alhtkWAlIS4i7TLhLsNgqi4Cr3DEaUJBYiVIHvUdR/eDoZJAO1dGV4VE:SWW04i7ZLsNgqE3ofJBYiVIiMDoZ3dG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" brwiin.exe -
Executes dropped EXE 1 IoCs
pid Process 1120 brwiin.exe -
Loads dropped DLL 2 IoCs
pid Process 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /l" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /w" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /d" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /b" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /p" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /q" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /s" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /y" a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /q" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /l" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /b" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /o" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /i" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /g" brwiin.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /o" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /k" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /v" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /n" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /s" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /e" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /y" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /c" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /a" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /e" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /i" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /r" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /a" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /v" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /z" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /d" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /z" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /j" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /g" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /f" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /n" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /x" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /y" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /h" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /t" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /w" brwiin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /r" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /h" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /j" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /x" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /u" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /f" a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /p" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /m" brwiin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /c" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /u" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /f" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /m" brwiin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /k" brwiin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\brwiin = "C:\\Users\\Admin\\brwiin.exe /t" brwiin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe 1120 brwiin.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1120 brwiin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 1120 brwiin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1120 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 28 PID 1528 wrote to memory of 1120 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 28 PID 1528 wrote to memory of 1120 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 28 PID 1528 wrote to memory of 1120 1528 a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe"C:\Users\Admin\AppData\Local\Temp\a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\brwiin.exe"C:\Users\Admin\brwiin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1120
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD503e81731019e736e4184f01106602e59
SHA1ab6bc6c4f48e22965973f8f5b18d5082ae92af4f
SHA256cde014997cb5b48c6540f43607fd7b8094395fe120546c93b12e03b68b218413
SHA512011733e342a0e873cd2e3d86943c5f60ab34b8ef7a995f2db0db03912948159341037de3cfbc8aa9707948822b717c895fe5983381d94531483b3b4bb0236e80
-
Filesize
164KB
MD503e81731019e736e4184f01106602e59
SHA1ab6bc6c4f48e22965973f8f5b18d5082ae92af4f
SHA256cde014997cb5b48c6540f43607fd7b8094395fe120546c93b12e03b68b218413
SHA512011733e342a0e873cd2e3d86943c5f60ab34b8ef7a995f2db0db03912948159341037de3cfbc8aa9707948822b717c895fe5983381d94531483b3b4bb0236e80
-
Filesize
164KB
MD503e81731019e736e4184f01106602e59
SHA1ab6bc6c4f48e22965973f8f5b18d5082ae92af4f
SHA256cde014997cb5b48c6540f43607fd7b8094395fe120546c93b12e03b68b218413
SHA512011733e342a0e873cd2e3d86943c5f60ab34b8ef7a995f2db0db03912948159341037de3cfbc8aa9707948822b717c895fe5983381d94531483b3b4bb0236e80
-
Filesize
164KB
MD503e81731019e736e4184f01106602e59
SHA1ab6bc6c4f48e22965973f8f5b18d5082ae92af4f
SHA256cde014997cb5b48c6540f43607fd7b8094395fe120546c93b12e03b68b218413
SHA512011733e342a0e873cd2e3d86943c5f60ab34b8ef7a995f2db0db03912948159341037de3cfbc8aa9707948822b717c895fe5983381d94531483b3b4bb0236e80