Analysis
-
max time kernel
252s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe
Resource
win10v2004-20221111-en
General
-
Target
8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe
-
Size
212KB
-
MD5
fd6b7739e7699b6492f4e26b994309db
-
SHA1
c97c253def97399dfda45c4424e5f68fd87299e2
-
SHA256
8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c
-
SHA512
5cbfb037d08a84505e3135db00039503a8ae0cf3c9810219f0b392890631d52a77c8f518db3c1b177c16fc95125f77220822110159dadbd1bfd92342a18ba444
-
SSDEEP
3072:R9UB99PLzQsJhGYiNAcXOqQnys80/p5GomjRMEQYbLlmuPU+BfPc1rPU35pJucyU:RqBj2OqQn580/JXEJpc1rPXi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roobo.exe -
Executes dropped EXE 1 IoCs
pid Process 552 roobo.exe -
Loads dropped DLL 2 IoCs
pid Process 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /h" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /d" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /o" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /f" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /g" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /s" 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /p" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /a" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /i" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /z" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /e" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /c" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /b" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /m" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /v" roobo.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /l" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /k" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /j" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /q" roobo.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /n" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /x" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /t" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /y" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /u" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /w" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /s" roobo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\roobo = "C:\\Users\\Admin\\roobo.exe /r" roobo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe 552 roobo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 552 roobo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 792 wrote to memory of 552 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 28 PID 792 wrote to memory of 552 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 28 PID 792 wrote to memory of 552 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 28 PID 792 wrote to memory of 552 792 8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe"C:\Users\Admin\AppData\Local\Temp\8310cc7c360863351d34b14d6401cd027b8b412429190bc199fa38c4b4899e9c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\roobo.exe"C:\Users\Admin\roobo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5e0d799fbc867a2824d07cbed10fe348d
SHA1bcc91d022f74dfd328a96c6c17e256f65da675d5
SHA2568722354840d3ddc362d16cfcdcf90a44f344cdb9e0d653ba19af2cbd3a4c1813
SHA512288f08b483bbbe9581c9ae7741ed720de2d658503a141527885bcec779dedbaf6032dd925c6227f5fabe224fb65e34fae681a433a9ea95ea02ea50b9066dd655
-
Filesize
212KB
MD5e0d799fbc867a2824d07cbed10fe348d
SHA1bcc91d022f74dfd328a96c6c17e256f65da675d5
SHA2568722354840d3ddc362d16cfcdcf90a44f344cdb9e0d653ba19af2cbd3a4c1813
SHA512288f08b483bbbe9581c9ae7741ed720de2d658503a141527885bcec779dedbaf6032dd925c6227f5fabe224fb65e34fae681a433a9ea95ea02ea50b9066dd655
-
Filesize
212KB
MD5e0d799fbc867a2824d07cbed10fe348d
SHA1bcc91d022f74dfd328a96c6c17e256f65da675d5
SHA2568722354840d3ddc362d16cfcdcf90a44f344cdb9e0d653ba19af2cbd3a4c1813
SHA512288f08b483bbbe9581c9ae7741ed720de2d658503a141527885bcec779dedbaf6032dd925c6227f5fabe224fb65e34fae681a433a9ea95ea02ea50b9066dd655
-
Filesize
212KB
MD5e0d799fbc867a2824d07cbed10fe348d
SHA1bcc91d022f74dfd328a96c6c17e256f65da675d5
SHA2568722354840d3ddc362d16cfcdcf90a44f344cdb9e0d653ba19af2cbd3a4c1813
SHA512288f08b483bbbe9581c9ae7741ed720de2d658503a141527885bcec779dedbaf6032dd925c6227f5fabe224fb65e34fae681a433a9ea95ea02ea50b9066dd655