Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe
Resource
win10v2004-20220812-en
General
-
Target
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe
-
Size
260KB
-
MD5
1ee4e2811c7aadbd5f96f7b348888f10
-
SHA1
648b238db02a82b582ace6336bcacba67aeda9f9
-
SHA256
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b
-
SHA512
b0826d3da562e61068401f5ddfa0177a2070c0a452b2f0b68f140bd56c9ea9d95bba8e5257a6fdba53e20e125daca76b1f7d9a10b565cd80e64b7c16b6b47a9a
-
SSDEEP
3072:8gfAlNfRiIwvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWM:8dJgTSrMaIl/jcLijfHFEHWzXvjT85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leixaoj.exe -
Executes dropped EXE 1 IoCs
pid Process 900 leixaoj.exe -
Loads dropped DLL 2 IoCs
pid Process 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /U" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /O" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /N" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /M" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /x" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /a" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /B" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /y" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /z" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /E" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /S" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /I" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /l" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /g" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /G" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /w" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /J" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /A" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /s" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /R" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /r" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /q" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /F" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /K" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /Z" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /c" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /e" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /v" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /j" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /H" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /D" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /Y" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /t" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /i" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /m" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /b" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /T" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /L" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /P" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /o" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /f" leixaoj.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /n" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /W" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /h" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /X" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /u" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /V" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /p" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /k" leixaoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\leixaoj = "C:\\Users\\Admin\\leixaoj.exe /d" leixaoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe 900 leixaoj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 900 leixaoj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 900 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 28 PID 832 wrote to memory of 900 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 28 PID 832 wrote to memory of 900 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 28 PID 832 wrote to memory of 900 832 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe"C:\Users\Admin\AppData\Local\Temp\44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\leixaoj.exe"C:\Users\Admin\leixaoj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5a9d6f3ce0d5d079bbbe1053ff6e38f52
SHA16a952693628d8c3332c7838211d1ffc4e252f7f7
SHA256ca1bc40390811b6c1be8370ff035e086a260fcf670740cc161711d5cc66c3b1d
SHA5123302382007bb4350588f2f0506ae7a8575c5b74d141f1ccc7b330cc66cf582d4e53ad6633f4a1153d06ca54d282ccec74f4c49f569b42a17f48724e4f74cd486
-
Filesize
260KB
MD5a9d6f3ce0d5d079bbbe1053ff6e38f52
SHA16a952693628d8c3332c7838211d1ffc4e252f7f7
SHA256ca1bc40390811b6c1be8370ff035e086a260fcf670740cc161711d5cc66c3b1d
SHA5123302382007bb4350588f2f0506ae7a8575c5b74d141f1ccc7b330cc66cf582d4e53ad6633f4a1153d06ca54d282ccec74f4c49f569b42a17f48724e4f74cd486
-
Filesize
260KB
MD5a9d6f3ce0d5d079bbbe1053ff6e38f52
SHA16a952693628d8c3332c7838211d1ffc4e252f7f7
SHA256ca1bc40390811b6c1be8370ff035e086a260fcf670740cc161711d5cc66c3b1d
SHA5123302382007bb4350588f2f0506ae7a8575c5b74d141f1ccc7b330cc66cf582d4e53ad6633f4a1153d06ca54d282ccec74f4c49f569b42a17f48724e4f74cd486
-
Filesize
260KB
MD5a9d6f3ce0d5d079bbbe1053ff6e38f52
SHA16a952693628d8c3332c7838211d1ffc4e252f7f7
SHA256ca1bc40390811b6c1be8370ff035e086a260fcf670740cc161711d5cc66c3b1d
SHA5123302382007bb4350588f2f0506ae7a8575c5b74d141f1ccc7b330cc66cf582d4e53ad6633f4a1153d06ca54d282ccec74f4c49f569b42a17f48724e4f74cd486