Analysis
-
max time kernel
187s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe
Resource
win10v2004-20220901-en
General
-
Target
a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe
-
Size
176KB
-
MD5
f42442da034fb8ca9cf8ee0e62393604
-
SHA1
6b6b550226e8378bd7dfae37fb28d113884a2991
-
SHA256
a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58
-
SHA512
cc47aa3b41195cfe4caaa30dd42c244207f55f4d7c96bd37809a68f2d6ea2a0a59d527c7b2007eec1e39f8efe407ca499de7562335295c59aa5af31469b340e3
-
SSDEEP
3072:zdAh8C/nROzg7iiwJvXZETcbLn67kLpyRurohZbsn4KhWNUzMzGV5/bBD3yFL6V5:Wh7YU7iiwJvXZETcbLn6YLProhZbsn4/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jieluen.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe -
Executes dropped EXE 1 IoCs
pid Process 672 jieluen.exe -
Loads dropped DLL 2 IoCs
pid Process 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe -
Adds Run key to start application 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /Z" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /q" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /x" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /u" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /Y" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /U" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /S" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /O" jieluen.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /p" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /c" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /H" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /g" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /v" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /z" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /W" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /L" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /j" jieluen.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /s" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /C" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /m" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /B" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /o" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /h" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /D" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /t" a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /y" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /P" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /X" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /e" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /T" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /k" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /V" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /n" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /G" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /l" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /t" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /a" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /r" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /M" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /i" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /K" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /N" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /b" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /F" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /I" jieluen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\jieluen = "C:\\Users\\Admin\\jieluen.exe /A" jieluen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe 672 jieluen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 672 jieluen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 672 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 27 PID 1740 wrote to memory of 672 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 27 PID 1740 wrote to memory of 672 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 27 PID 1740 wrote to memory of 672 1740 a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe"C:\Users\Admin\AppData\Local\Temp\a9ddefe5f43caf6e4fb3db393f6f71a7f7bb6ad0f19c19c787bd7a8473467c58.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\jieluen.exe"C:\Users\Admin\jieluen.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD57dbd21e9622ef6c6009c456ecb5dc23f
SHA130e556dd72b900cb7933ccbcae94eca42af8440d
SHA256ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618
SHA512c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249
-
Filesize
176KB
MD57dbd21e9622ef6c6009c456ecb5dc23f
SHA130e556dd72b900cb7933ccbcae94eca42af8440d
SHA256ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618
SHA512c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249
-
Filesize
176KB
MD57dbd21e9622ef6c6009c456ecb5dc23f
SHA130e556dd72b900cb7933ccbcae94eca42af8440d
SHA256ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618
SHA512c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249
-
Filesize
176KB
MD57dbd21e9622ef6c6009c456ecb5dc23f
SHA130e556dd72b900cb7933ccbcae94eca42af8440d
SHA256ea3d74b2599de3d64f5fc0ef66a370f29ecac102e4f5daa52d1220dffed6f618
SHA512c148a1f2281d3efe0f04cdf8b1b726cd1a016f8735025592b6b5a83a46fcfd8935566d89ae7023f24c3c1e7b772f28351530916a09a6d62ae71e941cd8366249